Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    In this paper, we define a process to model and simulate attack scenarios in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are associated to create exploitation graphs (e-graphs) which are used to represent attack scenarios. Experiments carried out in a cluster computing environment showed the usefulness of proposed techniques in providing in-depth attack scenario analyses for security engineering. Critical vulnerabilities can be identified by employing graph algorithms. Several factors were used to measure the difficulty in executing an attack. A cost/benefit analysis was used for more accurate quantitative analysis of attack scenarios. We have also shown how the attack scenario analyses better help deployment of security products and design of network topologies.

    Original languageEnglish
    Title of host publicationProceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS'06
    Pages225c
    DOIs
    StatePublished - 2006
    Event39th Annual Hawaii International Conference on System Sciences, HICSS'06 - Kauai, HI, United States
    Duration: Jan 4 2006Jan 7 2006

    Publication series

    NameProceedings of the Annual Hawaii International Conference on System Sciences
    Volume9
    ISSN (Print)1530-1605

    Conference

    Conference39th Annual Hawaii International Conference on System Sciences, HICSS'06
    Country/TerritoryUnited States
    CityKauai, HI
    Period1/4/061/7/06

    ASJC Scopus Subject Areas

    • General Engineering

    Fingerprint

    Dive into the research topics of 'Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering'. Together they form a unique fingerprint.

    Cite this