Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2354410.2355170guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Time-efficient and cost-effective network hardening using attack graphs

Published: 25 June 2012 Publication History

Abstract

Attack graph analysis has been established as a powerful tool for analyzing network vulnerability. However, previous approaches to network hardening look for exact solutions and thus do not scale. Further, hardening elements have been treated independently, which is inappropriate for real environments. For example, the cost for patching many systems may be nearly the same as for patching a single one. Or patching a vulnerability may have the same effect as blocking traffic with a firewall, while blocking a port may deny legitimate service. By failing to account for such hardening interdependencies, the resulting recommendations can be unrealistic and far from optimal. Instead, we formalize the notion of hardening strategy in terms of allowable actions, and define a cost model that takes into account the impact of interdependent hardening actions. We also introduce a near-optimal approximation algorithm that scales linearly with the size of the graphs, which we validate experimentally.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
DSN '12: Proceedings of the 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
June 2012
588 pages
ISBN:9781467316248

Publisher

IEEE Computer Society

United States

Publication History

Published: 25 June 2012

Author Tags

  1. attack graphs
  2. intrusion prevention
  3. network hardening
  4. reliability
  5. vulnerability analysis

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2017)A framework for automating security analysis of the internet of thingsJournal of Network and Computer Applications10.1016/j.jnca.2017.01.03383:C(12-27)Online publication date: 1-Apr-2017
  • (2017)A survey on the usability and practical applications of Graphical Security ModelsComputer Science Review10.1016/j.cosrev.2017.09.00126:C(1-16)Online publication date: 1-Nov-2017
  • (2017)ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network ConfigurationJournal of Network and Systems Management10.1007/s10922-017-9428-x25:4(759-783)Online publication date: 1-Oct-2017
  • (2016)Optimizing the RoI of Cyber Risk MitigationProceedings of the 12th Conference on International Conference on Network and Service Management10.5555/3375069.3375097(223-227)Online publication date: 31-Oct-2016
  • (2016)A Survey on Systems Security MetricsACM Computing Surveys10.1145/300571449:4(1-35)Online publication date: 20-Dec-2016
  • (2016)Interdicting attack graphs to protect organizations from cyber attacksComputers and Operations Research10.1016/j.cor.2016.05.00575:C(118-131)Online publication date: 1-Nov-2016

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media