Building Compact Exploitation Graphs for a Cluster Computing Environment

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, a modeling process is described to address challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are combined to create exploitation graphs (e-graphs), which are used to represent attack scenarios. The modeling process consists of three primary steps. The first step is the creation of a knowledge base of known system vulnerabilities. These vulnerabilities are represented using pre-conditions and post-conditions. A template is used to represent pre-conditions and post-conditions, and vulnerabilities are encoded using a pre-defined set of attributes. The second step involves the association of multiple vulnerabilities to create an e-graph specific to the system being modeled. The third step of this process involves the development of abstraction techniques that can be used to simplify exploitation graphs. A novel abstraction technique is proposed based on host connection similarity and exploitation similarity. These techniques have been applied into a high-performance cluster computing environment to show that they facilitate a compact representation of attack scenarios and provide in-depth vulnerability assessments.

Original languageAmerican English
Title of host publicationProceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
Pages50-57
Number of pages8
DOIs
StatePublished - 2005
Externally publishedYes
Event6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005 - West Point, NY, United States
Duration: Jun 15 2005Jun 17 2005

Publication series

NameProceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
Volume2005

Conference

Conference6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
Country/TerritoryUnited States
CityWest Point, NY
Period6/15/056/17/05

ASJC Scopus Subject Areas

  • General Engineering

Keywords

  • Abstraction
  • Attack modeling
  • Cluster computing
  • Exploitation graph (e-graph)
  • Network security

Fingerprint

Dive into the research topics of 'Building Compact Exploitation Graphs for a Cluster Computing Environment'. Together they form a unique fingerprint.

Cite this