Skip to main navigation Skip to search Skip to main content

A Security Engineering Process for Vulnerability Assessment

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    In this paper a practical security engineering process for vulnerability assessment (VA) is introduced. This process involves the use of an attack modeling technique referred to as exploitation graphs (e-graphs). An e-graph is a straightforward representation of the overall security status of a network environment by associating system configurations and known vulnerabilities existing on different hosts. The graph generation process is introduced. A case study shows the effectiveness of the proposed approach in evaluating VA activities for an operational network environment.

    Original languageAmerican English
    Title of host publication19th International Conference on Computer Applications in Industry and Engineering, CAINE 2006
    Pages352-357
    Number of pages6
    StatePublished - 2006
    Event19th International Conference on Computer Applications in Industry and Engineering, CAINE 2006 - Las Vegas, NV, United States
    Duration: Nov 13 2006Nov 15 2006

    Publication series

    Name19th International Conference on Computer Applications in Industry and Engineering, CAINE 2006

    Conference

    Conference19th International Conference on Computer Applications in Industry and Engineering, CAINE 2006
    Country/TerritoryUnited States
    CityLas Vegas, NV
    Period11/13/0611/15/06

    ASJC Scopus Subject Areas

    • Computer Science Applications
    • Industrial and Manufacturing Engineering

    Fingerprint

    Dive into the research topics of 'A Security Engineering Process for Vulnerability Assessment'. Together they form a unique fingerprint.

    Cite this