@inproceedings{8e9704d0b3994d03856d8f44d4691be6,
title = "Exploit-based analysis of attack models",
abstract = "Protecting network-accessible resources from unauthorized use requires understanding of network vulnerability. Building attack models as chains of vulnerability exploits by an attacker can help locate flaws to prevent attacks. This paper presents an approach to automatically analyzing security attack models called exploit-based analysis. By using knowledge about exploitability of network vulnerabilities combined with a Markov computational process commonly used in link analysis, exploit based analysis ranks nodes in the attack model in order of their likelihoods of being compromised. The paper discusses the details of the approach, illustrates its use, and compares results with an existing technique.",
keywords = "Attack graphs, network security, network vulnerability, ranking algorithm, security models",
author = "Phongphun Kijsanayothin and Rattikorn Hewett",
year = "2013",
doi = "10.1109/NCA.2013.18",
language = "English",
isbn = "9780768550436",
series = "Proceedings - IEEE 12th International Symposium on Network Computing and Applications, NCA 2013",
pages = "183--186",
booktitle = "Proceedings - IEEE 12th International Symposium on Network Computing and Applications, NCA 2013",
note = "12th Annual IEEE International Symposium on Network Computing and Applications, NCA 2013 ; Conference date: 22-08-2013 Through 24-08-2013",
}