DocumentCode
1706497
Title
Building compact exploitation graphs for a cluster computing environment
Author
Li, Wei ; Vaughn, Rayford
Author_Institution
Center for Comput. Security Res., Mississippi State Univ., MS, USA
fYear
2005
Firstpage
50
Lastpage
57
Abstract
In this paper, a modeling process is described to address challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are combined to create exploitation graphs (e-graphs), which are used to represent attack scenarios. The modeling process consists of three primary steps. The first step is the creation of a knowledge base of known system vulnerabilities. These vulnerabilities are represented using preconditions and postconditions. A template is used to represent preconditions and postconditions, and vulnerabilities are encoded using a predefined set of attributes. The second step involves the association of multiple vulnerabilities to create an e-graph specific to the system being modeled. The third step of this process involves the development of abstraction techniques that can be used to simplify exploitation graphs. A novel abstraction technique is proposed based on host connection similarity and exploitation similarity. These techniques have been applied into a high-performance cluster computing environment to show that they facilitate a compact representation of attack scenarios and provide in-depth vulnerability assessments.
Keywords
graph theory; risk management; security of data; workstation clusters; abstraction techniques; attack modeling; attack scenarios; e-graphs; exploitation graphs; exploitation similarity; high-performance cluster computing; host connection similarity; network security; network vulnerability; system configuration; system vulnerability; vulnerability assessment; vulnerability scanner; Buildings; Computational modeling; Computer networks; Computer security; High performance computing; Information security; Network topology; Sensor systems; Testing; Tree data structures;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC
Print_ISBN
0-7803-9290-6
Type
conf
DOI
10.1109/IAW.2005.1495933
Filename
1495933
Link To Document