Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2070425.2070433acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Corporate networks security evaluation based on attack graphs

Published: 14 November 2011 Publication History

Abstract

Using attack graphs for the security analysis allows to consider the relationship of individual components and their security parameters. It gives more accurate data to assess the security of the system as a whole comparing with investigation of security properties of the individual nodes. This paper describes the calculation of attack graph, analyze the results and evaluate the effectiveness of existing countermeasures. The model allows dynamic routing, filtering on any network object, NAT. States in attack graph are detailed to confidentiality, integrity, availability triad. In constructing the attack graph takes into account both local and network vulnerability. The results of experimental evaluation of system performance presented. For the analysis of 10000 simulated hosts took an average time of about 100 seconds. The number of access control rules (from 500 to 4000 per simulated subnet) were chosen so that the maximum number of filtering rules for devices were about 1,000.

References

[1]
ISO / IEC 15408--3:2009.
[2]
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth Webster, Stephen Boyer, "Modeling Modern Network Attacks and Countermeasures Using Attack Graphs," acsac, pp.117--126, 2009 Annual Computer Security Applications Conference, 2009.
[3]
3.Sushil Jajodia, Steven Noel, "Topological Vulnerability Analysis", Advances in Information Security, 2010, Volume 46, Part 4, pp. 139--154.
[4]
Common platform enumeration. MITRE. http://cpe.mitre.org
[5]
Common Vulnerability Scoring System. Forum of Incident Response and Security Teams, Common Vulnerability Scoring System-Special Interest Group. http://www.first.org/cvss/ .
[6]
http://oval.mitre.org/language/interpreter.html .
[7]
National Vulnerability Database. http://nvd.nist.gov/download.cfm .
[8]
Official Common Platform Enumeration Dictionary. http://nvd.nist.gov/cpe.cfm .
[9]
ISO / IEC 15408--1:2009.
[10]
Evgeny Abramov, Denis Mordvin, and Oleg Makarevich. 2010. Automated method for constructing of network traffic filtering rules. In Proceedings of the 3rd international conference on Security of information and networks (SIN '10).ACM, New York, NY, USA, 203--211. DOI = 10.1145/1854099.1854141 http://doi.acm.org/10.1145/1854099.1854141
[11]
Common Vulnerabilities and Exposures. MITRE. http://cve.mitre.org/ .
[12]
L. Yuan et al., "FIREMAN: A toolkit for FIREwall modeling and ANalysis," in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2006, pp. 199--213.

Cited By

View all
  • (2013)Using quadrocopter as a pentest toolProceedings of the 6th International Conference on Security of Information and Networks10.1145/2523514.2527019(404-407)Online publication date: 26-Nov-2013
  • (2013)Development of a secure cluster-based wireless sensor network modelProceedings of the 6th International Conference on Security of Information and Networks10.1145/2523514.2523565(372-375)Online publication date: 26-Nov-2013
  1. Corporate networks security evaluation based on attack graphs

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SIN '11: Proceedings of the 4th international conference on Security of information and networks
    November 2011
    276 pages
    ISBN:9781450310208
    DOI:10.1145/2070425
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • SDU: Suleyman Demirel University
    • AOARD: Asian Office of Aerospace Research and Development
    • RDECOM: U.S. Army Research, Development and Engineering Command
    • US Army ITC-PAC Asian Research Office
    • AFOSR: AFOSR
    • ONRGlobal: U.S. Office of Naval Research Global
    • Macquarie University-Sydney

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 November 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. attack graph
    2. computer simulation
    3. countermeasures effectiveness
    4. iso/iec 15408
    5. netspa
    6. security analysis

    Qualifiers

    • Research-article

    Conference

    SIN 2011

    Acceptance Rates

    Overall Acceptance Rate 102 of 289 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 22 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2013)Using quadrocopter as a pentest toolProceedings of the 6th International Conference on Security of Information and Networks10.1145/2523514.2527019(404-407)Online publication date: 26-Nov-2013
    • (2013)Development of a secure cluster-based wireless sensor network modelProceedings of the 6th International Conference on Security of Information and Networks10.1145/2523514.2523565(372-375)Online publication date: 26-Nov-2013

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media