Title :
Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs
Author :
Li, Wei ; Vaughn, Rayford B.
Author_Institution :
Graduate Sch. of Comput. & Inf. Sci., Nova Southeastern Univ., Fort Lauderdale, FL
Abstract :
In this paper, we overview cluster security research underway at Mississippi State University (MSU) and focus on one particular effort involving a process to model system vulnerabilities and possible exploitations in specific cluster environments using exploitation graphs (e-graphs). Cluster security research at MSU has included attacks against clusters, anomaly detection, sensor fusion, VGLI security functionality in clusters, and the use of known system vulnerability data, system configuration data, and vulnerability scanner results to create e-graphs to model possible attack scenarios. The use of e-graphs is helpful in determining attacker work factor analysis, cost/benefit analysis of security, detection of attacks, and identification of critical vulnerabilities
Keywords :
graph theory; security of data; telecommunication security; workstation clusters; VGLI security functionality; anomaly detection; attack detection; attacker work factor analysis; cluster environments; cluster security research; critical vulnerability identification; exploitation graphs; network exploitation modeling; network securitv; security cost-benefit analysis; sensor fusion; system configuration data; system vulnerability data; vulnerability scanner; Aerospace electronics; Computer networks; Computer security; Condition monitoring; Cost benefit analysis; Data security; Intelligent sensors; Runtime; Sensor fusion; Sensor systems; cluster security; exploitation graph (e-graph); modeling and simulating; network security;
Conference_Titel :
Cluster Computing and the Grid, 2006. CCGRID 06. Sixth IEEE International Symposium on
Conference_Location :
Singapore
Print_ISBN :
0-7695-2585-7
DOI :
10.1109/CCGRID.2006.1630921