TY - GEN
T1 - A Security Engineering Process for Vulnerability Assessment
AU - Li, Wei
PY - 2006
Y1 - 2006
N2 - In this paper a practical security engineering process for vulnerability assessment (VA) is introduced. This process involves the use of an attack modeling technique referred to as exploitation graphs (e-graphs). An e-graph is a straightforward representation of the overall security status of a network environment by associating system configurations and known vulnerabilities existing on different hosts. The graph generation process is introduced. A case study shows the effectiveness of the proposed approach in evaluating VA activities for an operational network environment.
AB - In this paper a practical security engineering process for vulnerability assessment (VA) is introduced. This process involves the use of an attack modeling technique referred to as exploitation graphs (e-graphs). An e-graph is a straightforward representation of the overall security status of a network environment by associating system configurations and known vulnerabilities existing on different hosts. The graph generation process is introduced. A case study shows the effectiveness of the proposed approach in evaluating VA activities for an operational network environment.
UR - https://www.scopus.com/pages/publications/84883308762
UR - https://www.scopus.com/pages/publications/84883308762#tab=citedBy
M3 - Conference contribution
AN - SCOPUS:84883308762
SN - 9781604236750
T3 - 19th International Conference on Computer Applications in Industry and Engineering, CAINE 2006
SP - 352
EP - 357
BT - 19th International Conference on Computer Applications in Industry and Engineering, CAINE 2006
T2 - 19th International Conference on Computer Applications in Industry and Engineering, CAINE 2006
Y2 - 13 November 2006 through 15 November 2006
ER -