TY - JOUR
T1 - Ranking intrusion likelihoods with exploitability of network vulnerabilities in a large-scale attack model
AU - Hewett, Rattikorn
AU - Kijsanayothin, Phongphun
PY - 2015
Y1 - 2015
N2 - Network vulnerabilities are common sources of many security threats. Attack models representing chains of all possible vulnerability exploits by attackers can help locate security flaws and pre-determine appropriate preventative measures. To realize the full benefits of attack models, effective analysis is crucial. However, due to the size and complexity of the models, manually pinpointing potential critical attacks can be daunting. Thus, there is a need for an automated analysis approach. Existing techniques are either based on network topology alone or subjective prior knowledge. They do not utilize domain-specific knowledge. This paper presents an approach to automatically ranking states in an attack model in the order of their intrusion likelihoods. Using the degree of exploitability of network vulnerabilities and the Markov property, the proposed approach provides a tractable computation enhanced by domain-specific heuristic knowledge for estimating such likelihoods. The paper discusses the details of the approach, illustrates its use, and compares results with a similar existing technique with experiments on its performance.
AB - Network vulnerabilities are common sources of many security threats. Attack models representing chains of all possible vulnerability exploits by attackers can help locate security flaws and pre-determine appropriate preventative measures. To realize the full benefits of attack models, effective analysis is crucial. However, due to the size and complexity of the models, manually pinpointing potential critical attacks can be daunting. Thus, there is a need for an automated analysis approach. Existing techniques are either based on network topology alone or subjective prior knowledge. They do not utilize domain-specific knowledge. This paper presents an approach to automatically ranking states in an attack model in the order of their intrusion likelihoods. Using the degree of exploitability of network vulnerabilities and the Markov property, the proposed approach provides a tractable computation enhanced by domain-specific heuristic knowledge for estimating such likelihoods. The paper discusses the details of the approach, illustrates its use, and compares results with a similar existing technique with experiments on its performance.
KW - Attack graphs
KW - Network security
KW - Network vulnerability
KW - Ranking algorithm
KW - Security models
UR - http://www.scopus.com/inward/record.url?scp=84935456166&partnerID=8YFLogxK
M3 - Article
AN - SCOPUS:84935456166
SN - 1816-353X
VL - 17
SP - 383
EP - 394
JO - International Journal of Network Security
JF - International Journal of Network Security
IS - 4
ER -