Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1029208.1029225acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Managing attack graph complexity through visual hierarchical aggregation

Published: 29 October 2004 Publication History

Abstract

We describe a framework for managing network attack graph complexity through interactive visualization, which includes hierarchical aggregation of graph elements. Aggregation collapses non-overlapping subgraphs of the attack graph to single graph vertices, providing compression of attack graph complexity. Our aggregation is recursive (nested), according to a predefined aggregation hierarchy. This hierarchy establishes rules at each level of aggregation, with the rules being based on either common attribute values of attack graph elements or attack graph connectedness. The higher levels of the aggregation hierarchy correspond to higher levels of abstraction, providing progressively summarized visual overviews of the attack graph. We describe rich visual representations that capture relationships among our semantically-relevant attack graph abstractions, and our views support mixtures of elements at all levels of the aggregation hierarchy. While it would be possible to allow arbitrary nested aggregation of graph elements, it is better to constrain aggregation according to the semantics of the network attack problem, i.e., according to our aggregation hierarchy. The aggregation hierarchy also makes efficient automatic aggregation possible. We introduce the novel abstraction of protection domain as a level of the aggregation hierarchy, which corresponds to a fully-connected subgraph (clique) of the attack graph. We avoid expensive detection of attack graph cliques through knowledge of the network configuration, i.e. protection domains are predefined. While significant work has been done in automatically generating attack graphs, this is the first treatment of the management of attack graph complexity for interactive visualization. Overall, computation in our framework has worst-case quadratic complexity, but in practice complexity is greatly reduced because users generally interact with (often negligible) subsets of the attack graph. We apply our framework to a real network, using a software system we have developed for generating and visualizing network attack graphs.

References

[1]
C. Ramakrishnan, R. Sekar, "Model-Based Analysis of Configuration Vulnerabilities," in Proceedings of the 7th ACM Conference on Computer and Communication Security, November 2000.]]
[2]
R. Ritchey, P. Ammann, "Using Model Checking to Analyze Network Vulnerabilities," in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 2000.]]
[3]
O. Sheyner, J. Haines, S. Jha, R. Lippmann, J. Wing, "Automated Generation and Analysis of Attack Graphs," in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 2002.]]
[4]
S. Jha, O. Sheyner, J. Wing, "Two Formal Analyses of Attack Graphs," in Proceedings of the 15th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 2002.]]
[5]
R. Baldwin, Kuang: Rule Based Security Checking, Technical Report, MIT Lab for Computer Science, May 1994.]]
[6]
D. Zerkle, K. Levitt, "Netkuang - A Multi-Host Configuration Vulnerability Checker," in Proceedings of the 6th USENIX Unix Security Symposium, San Jose, CA, 1996.]]
[7]
C. Phillips, L. Swiler, "A Graph-Based System for Network-Vulnerability Analysis," in Proceedings of the New Security Paradigms Workshop, Charlottesville, VA, 1998.]]
[8]
L. Swiler, C. Phillips, D. Ellis, S. Chakerian, "Computer-Attack Graph Generation Tool," in Proceedings of the DARPA Information Survivability Conference & Exposition II, June 2001.]]
[9]
J. Dawkins, C. Campbell, J. Hale, "Modeling Network Attacks: Extending the Attack Tree Paradigm," in Proceedings of the Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, Johns Hopkins University, June 2002.]]
[10]
P. Ammann, D. Wijesekera, S. Kaushik, "Scalable, Graph-Based Network Vulnerability Analysis," in Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, November 2002.]]
[11]
S. Jajodia, S. Noel, B. O'Berry, "Topological Analysis of Network Attack Vulnerability," in Managing Cyber Threats: Issues, Approaches and Challenges, V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher, 2003.]]
[12]
F. Cuppens, R. Ortalo, "LAMBDA: A Language to Model a Database for Detection of Attacks," in Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection, Toulouse, France, October 2000.]]
[13]
S. Templeton, K. Levitt, "A Requires/Provides Model for Computer Attacks," in Proceedings of the New Security Paradigms Workshop, Cork Ireland, 2000.]]
[14]
R. Ritchey, B. O'Berry, S. Noel, "Representing TCP/IP Connectivity for Topological Analysis of Network Security," in Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 2002.]]
[15]
F. Cuppens, A. Miege, "Alert Correlation in a Cooperative Intrusion Detection Framework," in Proceedings of the 2002 IEEE Symposium on Security and Privacy, May 2002.]]
[16]
P. Ning, Y. Cui, D. Reeves, "Constructing Attack Scenarios through Correlation of Intrusion Alerts," in Proceedings of the 9th ACM Conference on Computer & Communications Security, Washington D.C., November 2002.]]
[17]
P. Ning, D. Xu, C. Healey, R. St. Amant, "Building Attack Scenarios through Integration of Complementary Alert Correlation Methods," in Proceedings of the 11th Annual Network and Distributed System Security Symposium, February, 2004.]]
[18]
S. Noel, S. Jajodia, "Correlating Intrusion Events and Building Attack Scenarios through Attack Graph Distances," submitted.]]
[19]
P. Eades, Q.-W. Feng, "Multilevel Visualization of Clustered Graphs," in Proceedings of the Symposium on Graph Drawing, September, 1996.]]
[20]
A. Buchsbaum, J. Westbrook, "Maintaining Hierarchical Graph Views," in Proceedings of the 11th ACM-SIAM Symposium on Discrete Algorithms, 2000.]]
[21]
M. Raitner, "HGV: A Library for Hierarchies, Graphs, and Views," in Proceedings of the Symposium on Graph Drawing, 2002.]]
[22]
M. Raitner, Maintaining Hierarchical Graph Views for Dynamic Graphs, Technical Report, MIP-0403, University of Passau, January, 2004.]]
[23]
S. Noel, S. Jajodia, B. O'Berry, M. Jacobs, "Efficient Minimum-Cost Network Hardening via Exploit Dependency Graphs," in Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 2003.]]
[24]
Nessus vulnerability scanner, <http://www.nessus.org/>.]]

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
October 2004
156 pages
ISBN:1581139748
DOI:10.1145/1029208
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 October 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. clustered graphs
  2. network attack graphs
  3. network attack modeling
  4. vulnerability analysis

Qualifiers

  • Article

Conference

CCS04
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)66
  • Downloads (Last 6 weeks)10
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Topological Vulnerability AnalysisEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1777(2629-2632)Online publication date: 8-Jan-2025
  • (2025)Attack GraphsEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1497(118-121)Online publication date: 8-Jan-2025
  • (2024)Study on Prediction and Response Model for Threat Diffusion Based on Multi-Step Reachability MatrixElectronics10.3390/electronics1319392113:19(3921)Online publication date: 3-Oct-2024
  • (2024)Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR NodesAlgorithms10.3390/a1711050417:11(504)Online publication date: 4-Nov-2024
  • (2024)Resiliency Graphs: Modelling the Interplay between Cyber Attacks and System Failures through AI Planning2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)10.1109/TPS-ISA62245.2024.00041(292-302)Online publication date: 28-Oct-2024
  • (2024)Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit AnalysisIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.325312121:1(298-308)Online publication date: Jan-2024
  • (2024)Fast Attack Graph Defense Localization via BisimulationFormal Methods10.1007/978-3-031-71162-6_13(245-263)Online publication date: 9-Sep-2024
  • (2023)A scalable algorithm for network reachability analysis with cyclic attack graphsJournal of Computer Security10.3233/JCS-21010331:1(29-55)Online publication date: 1-Jan-2023
  • (2023)A Visual Analytic Tool (VIADS) to Assist the Hypothesis Generation Process in Clinical Research: Mixed Methods Usability StudyJMIR Human Factors10.2196/4464410(e44644)Online publication date: 27-Apr-2023
  • (2023)Cyberattack Graph Modeling for Visual AnalyticsIEEE Access10.1109/ACCESS.2023.330464011(86910-86944)Online publication date: 2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media