Skip to main navigation Skip to search Skip to main content

An Approach to Model Network Exploitations Using Exploitation Graphs

  • Wei Li
  • , Rayford B. Vaughn
  • , Yoginder S. Dandass

    Research output: Contribution to journalArticlepeer-review

    Abstract

    In this article, a modeling process is defined to address challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are considered to create exploitation graphs (egraphs) that are used to represent attack scenarios. Experiments carried out in a cluster computing environment showed the usefulness of proposed techniques in providing in-depth attack scenario analyses for security engineering. Critical vulnerabilities can be identified by employing graph algorithms. Several factors were used to measure the difficulty in executing an attack. A cost/benefit analysis was used for more accurate quantitative analysis of attack scenarios.The authors also show how the attack scenario analyses better help deployment of security products and design of network topologies.

    Original languageAmerican English
    Pages (from-to)523-541
    Number of pages19
    JournalSimulation
    Volume82
    Issue number8
    DOIs
    StatePublished - Aug 2006

    ASJC Scopus Subject Areas

    • Software
    • Modeling and Simulation
    • Computer Graphics and Computer-Aided Design

    Keywords

    • Exploitation graph (e-graph)
    • computer security
    • graph-based modeling
    • vulnerability graph

    Disciplines

    • Computer Sciences

    Fingerprint

    Dive into the research topics of 'An Approach to Model Network Exploitations Using Exploitation Graphs'. Together they form a unique fingerprint.

    Cite this