Utilizing attack graphs to measure the efficacy of security frameworks across multiple applications

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

One of the primary challenges when developing or implementing a security framework for any particular environment is determining the efficacy of the implementation. Does the implementation address all of the potential vulnerabilities in the environment, or are there still unaddressed issues? Further, if there is a choice between two frameworks, what objective measure can be used to compare the frameworks? To address these questions, we propose utilizing a technique of attack graph analysis to map the attack surface of the environment and identify the most likely avenues of attack. We show that with this technique we can quantify the baseline state of an application and compare that to the attack surface after implementation of a security framework, while simultaneously allowing for comparison between frameworks in the same environment or a single framework across multiple applications.

Original languageEnglish
Title of host publicationProceedings of the 47th Annual Hawaii International Conference on System Sciences, HICSS 2014
PublisherIEEE Computer Society
Pages4915-4920
Number of pages6
ISBN (Print)9781479925049
DOIs
StatePublished - Jan 1 2014
Event47th Hawaii International Conference on System Sciences, HICSS 2014 - Waikoloa, HI, United States
Duration: Jan 6 2014Jan 9 2014

Publication series

Name2014 47th Hawaii International Conference on System Sciences

Conference

Conference47th Hawaii International Conference on System Sciences, HICSS 2014
Country/TerritoryUnited States
CityWaikoloa, HI
Period1/6/141/9/14

ASJC Scopus Subject Areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Utilizing attack graphs to measure the efficacy of security frameworks across multiple applications'. Together they form a unique fingerprint.

Cite this