Using exploitation graphs to model network exploitations

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we define a process to address the challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are considered to create exploitation graphs (e-graphs) which are used to represent attack scenarios. The modeling process consists of two primary steps. The first step is the creation of a knowledge base of vulnerability graphs (v-graphs) from known system vulnerabilities. The second step involves the association of multiple v-graphs to create an e-graph specific to a system being modeled. Experiments showed the usefulness of the proposed approach to model attack scenarios and deduct stages of attacks.

Original languageEnglish
Title of host publicationWMSCI 2005 - The 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings
Pages404-409
Number of pages6
StatePublished - 2005
Externally publishedYes
Event9th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2005 - Orlando, FL, United States
Duration: Jul 10 2005Jul 13 2005

Publication series

NameWMSCI 2005 - The 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings
Volume10

Conference

Conference9th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2005
Country/TerritoryUnited States
CityOrlando, FL
Period7/10/057/13/05

ASJC Scopus Subject Areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Information Systems

Keywords

  • Exploitation graph (e-graph)
  • Graph-based modeling
  • Network security
  • Vulnerability graph

Fingerprint

Dive into the research topics of 'Using exploitation graphs to model network exploitations'. Together they form a unique fingerprint.

Cite this