By Topic

A Goal-Oriented Approach for Modeling and Analyzing Attack Graph

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Xuejiao Liu ; Inst. of Comput. Network & Commun., HuaZhong Normal Univ., Hubei, China ; Chengfang Fang ; Debao Xiao ; Hui Xu

As network components are often highly interdependent and interconnected,an adversary outside can take advantage of multiple vulnerabilities in unexpected ways, incrementally penetrate a network and compromise critical systems. Attack graph is commonly used for analyzing network security level for its capability in reflecting all network vulnerabilities and their inter relationships. However, attack graph assumes an over pessimistic situation by giving the attacker unlimited power of exploiting each chain of vulnerabilities in the network, leading the complexity of analyzing to grow exponentially with the size of network. Therefore, the weakest paths suggested by such analysis could be inaccurate for adversary with limited computation power. In this paper, we investigate how attackers are planning to exploit vulnerabilities towards their targets and present the idea of a goal-oriented analysis of attack graph to address this problem. We give algorithms for analyzing network vulnerabilities, predicting attackers's potential target, and giving suggestions on patching the weakest nodes based on attackers' targets.

Published in:

Information Science and Applications (ICISA), 2010 International Conference on

Date of Conference:

21-23 April 2010