DocumentCode :
3400544
Title :
Exploit-based Analysis of Attack Models
Author :
Kijsanayothin, Phongphun ; Hewett, Rattikorn
Author_Institution :
Dept. of Electr. & Comput. Eng., Naresuan Univ., Phitsanulok, Thailand
fYear :
2013
fDate :
22-24 Aug. 2013
Firstpage :
183
Lastpage :
186
Abstract :
Protecting network-accessible resources from unauthorized use requires understanding of network vulnerability. Building attack models as chains of vulnerability exploits by an attacker can help locate flaws to prevent attacks. This paper presents an approach to automatically analyzing security attack models called exploit-based analysis. By using knowledge about exploitability of network vulnerabilities combined with a Markov computational process commonly used in link analysis, exploit based analysis ranks nodes in the attack model in order of their likelihoods of being compromised. The paper discusses the details of the approach, illustrates its use, and compares results with an existing technique.
Keywords :
Markov processes; authorisation; computer network security; telecommunication links; Markov computational process; attack prevention; automatic security attack model analysis; exploit-based attack model analysis; link analysis; network vulnerability exploitability; network-accessible resources; node ranking; Adaptation models; Algorithm design and analysis; Analytical models; Complexity theory; Computational modeling; Knowledge engineering; Security; Attack graphs; network security; network vulnerability; ranking algorithm; security models;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Computing and Applications (NCA), 2013 12th IEEE International Symposium on
Conference_Location :
Cambridge, MA
Print_ISBN :
978-0-7695-5043-5
Type :
conf
DOI :
10.1109/NCA.2013.18
Filename :
6623661
Link To Document :
بازگشت