Validating and restoring defense in depth using attack graphs

Keywordssecurity–security metrics–attack graphs–exploitability Data provided are for informational purposes only.

validating and restoring defense in depth using attack graphs-47validating and restoring defense in depth using attack graphs-46

—Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system.

These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions.

Construction by hand, however, is tedious, error prone, and impractical for attack graphs larger than a hundred nodes.

In this paper we present an automated technique for generating and analyzing attack graphs.

It provides a simplified view of critical steps that can be taken by an attacker and of host-to-host network reachability that enables these exploits.

This paper presents GARNET (Graphical Attack graph and Reachability Network Evaluation Tool), an interactive visualization tool that facilitates attack graph analysis.To ensure the availability of the Digital Library we can not allow these types of requests to continue.The restriction will be removed automatically once this activity stops. The difficulty associated with breaching an enterprise network is commensurate with the security of that network.A security breach, or a security policy violation, occurs as a result of an attacker successfully executing some attack path.To provide these desirable attributes, we propose a regular-expressions-inspired language whose rationale for attack path complexity measurement is based on Kolmogorov Complexity.

Tags: , ,