Using Exploit Similarities for Concise Representation of Attack Scenarios

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Attack graphs have been used to simulate attack scenarios to provide solutions for vulnerability analysis. However the scalability issue of attack graphs is still a big challenge. In this paper we present a detailed analysis on the scalability issue for attack graph. We also propose an approach to simplify attack graphs based on the similarity features of hosts and exploits in networked environments. In this modeling process we focus on the outcomes of exploits and eliminate details of specific exploits. A case study is used to show the effectiveness of the approach. This approach can be highly-efficient for networks in which multiple similar hosts are deployed or similar vulnerabilities are discovered.

    Original languageAmerican English
    Title of host publication21st International Conference on Computer Applications in Industry and Engineering, CAINE 2008
    Pages162-167
    Number of pages6
    StatePublished - 2008
    Event21st International Conference on Computer Applications in Industry and Engineering, CAINE 2008 - Honolulu, HI, United States
    Duration: Nov 12 2008Nov 14 2008

    Publication series

    Name21st International Conference on Computer Applications in Industry and Engineering, CAINE 2008

    Conference

    Conference21st International Conference on Computer Applications in Industry and Engineering, CAINE 2008
    Country/TerritoryUnited States
    CityHonolulu, HI
    Period11/12/0811/14/08

    ASJC Scopus Subject Areas

    • Computer Science Applications
    • Industrial and Manufacturing Engineering

    Keywords

    • Attack graph
    • Network security
    • Vulnerability analysis

    Fingerprint

    Dive into the research topics of 'Using Exploit Similarities for Concise Representation of Attack Scenarios'. Together they form a unique fingerprint.

    Cite this