Extending Attack Graph-Based Security Metrics and Aggregating Their Application

被引:103
作者
Idika, Nwokedi [1 ]
Bhargava, Bharat [2 ]
机构
[1] MIT Lincoln Lab, Lexington, MA 02420 USA
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
Network-level security and protection; measurement; measurement techniques;
D O I
10.1109/TDSC.2010.61
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The attack graph is an abstraction that reveals the ways an attacker can leverage vulnerabilities in a network to violate a security policy. When used with attack graph-based security metrics, the attack graph may be used to quantitatively assess security-relevant aspects of a network. The Shortest Path metric, the Number of Paths metric, and the Mean of Path Lengths metric are three attack graph-based security metrics that can extract security-relevant information. However, one's usage of these metrics can lead to misleading results. The Shortest Path metric and the Mean of Path Lengths metric fail to adequately account for the number of ways an attacker may violate a security policy. The Number of Paths metric fails to adequately account for the attack effort associated with the attack paths. To overcome these shortcomings, we propose a complimentary suite of attack graph-based security metrics and specify an algorithm for combining the usage of these metrics. We present simulated results that suggest that our approach reaches a conclusion about which of two attack graphs correspond to a network that is most secure in many instances.
引用
收藏
页码:75 / 85
页数:11
相关论文
共 19 条
[1]  
[Anonymous], 2006, Proceedings of the 2nd ACM workshop on Quality of protection
[2]  
Dantu R, 2005, LECT NOTES COMPUT SC, V3495, P115
[3]  
Dupont P., 1977, REND SEM MAT U POLIT, V36, P125
[4]  
Idika N., 2009, P TAPIA 09 R TAP CEL
[5]   Practical attack graph generation for network defense [J].
Ingols, Kyle ;
Lippmann, Richard ;
Piwowarski, Keith .
22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, :121-+
[6]  
Jha S., 2002, P 15 IEEE COMP SEC F
[7]  
Jonsson E., 1997, IEEE T SOFTWARE ENG
[8]  
Li W., 2006, P 6 IEEE INT S CLUST
[9]  
Lippmann R., 2006, P MIL COMM C OCT
[10]   Common vulnerability, scoring system [J].
Mell, Peter ;
Scarfone, Karen ;
Romanosky, Sasha .
IEEE SECURITY & PRIVACY, 2006, 4 (06) :85-89