[PDF][PDF] A graph-based system for network-vulnerability analysis
C Phillips, LP Swiler - Proceedings of the 1998 workshop on New …, 1998 - dl.acm.org
Proceedings of the 1998 workshop on New security paradigms, 1998•dl.acm.org
This paper presents a graph-based approach to network vulnerability analysis. The method
is flexible, allowing analysis of attacks from both outside and inside the network. It can
analyze risks to a specific network asset, or examine the universe of possible consequences
following a successful attack. The graph-based tool can identify the set of attack paths that
have a high probability of success (or a low" effort" cost) for the attacker. The system could
be used to test the effectiveness of making configuration changes, implementing an intrusion …
is flexible, allowing analysis of attacks from both outside and inside the network. It can
analyze risks to a specific network asset, or examine the universe of possible consequences
following a successful attack. The graph-based tool can identify the set of attack paths that
have a high probability of success (or a low" effort" cost) for the attacker. The system could
be used to test the effectiveness of making configuration changes, implementing an intrusion …
Abstract
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low" effort" cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc.
The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is" matched" with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.
ACM Digital Library