Exploit-based analysis of attack models

Phongphun Kijsanayothin, Rattikorn Hewett

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Protecting network-accessible resources from unauthorized use requires understanding of network vulnerability. Building attack models as chains of vulnerability exploits by an attacker can help locate flaws to prevent attacks. This paper presents an approach to automatically analyzing security attack models called exploit-based analysis. By using knowledge about exploitability of network vulnerabilities combined with a Markov computational process commonly used in link analysis, exploit based analysis ranks nodes in the attack model in order of their likelihoods of being compromised. The paper discusses the details of the approach, illustrates its use, and compares results with an existing technique.

Original languageEnglish
Title of host publicationProceedings - IEEE 12th International Symposium on Network Computing and Applications, NCA 2013
Pages183-186
Number of pages4
DOIs
StatePublished - 2013
Event12th Annual IEEE International Symposium on Network Computing and Applications, NCA 2013 - Cambridge, MA, United States
Duration: Aug 22 2013Aug 24 2013

Publication series

NameProceedings - IEEE 12th International Symposium on Network Computing and Applications, NCA 2013

Conference

Conference12th Annual IEEE International Symposium on Network Computing and Applications, NCA 2013
Country/TerritoryUnited States
CityCambridge, MA
Period08/22/1308/24/13

Keywords

  • Attack graphs
  • network security
  • network vulnerability
  • ranking algorithm
  • security models

Fingerprint

Dive into the research topics of 'Exploit-based analysis of attack models'. Together they form a unique fingerprint.

Cite this