DocumentCode :
1706497
Title :
Building compact exploitation graphs for a cluster computing environment
Author :
Li, Wei ; Vaughn, Rayford
Author_Institution :
Center for Comput. Security Res., Mississippi State Univ., MS, USA
fYear :
2005
Firstpage :
50
Lastpage :
57
Abstract :
In this paper, a modeling process is described to address challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are combined to create exploitation graphs (e-graphs), which are used to represent attack scenarios. The modeling process consists of three primary steps. The first step is the creation of a knowledge base of known system vulnerabilities. These vulnerabilities are represented using preconditions and postconditions. A template is used to represent preconditions and postconditions, and vulnerabilities are encoded using a predefined set of attributes. The second step involves the association of multiple vulnerabilities to create an e-graph specific to the system being modeled. The third step of this process involves the development of abstraction techniques that can be used to simplify exploitation graphs. A novel abstraction technique is proposed based on host connection similarity and exploitation similarity. These techniques have been applied into a high-performance cluster computing environment to show that they facilitate a compact representation of attack scenarios and provide in-depth vulnerability assessments.
Keywords :
graph theory; risk management; security of data; workstation clusters; abstraction techniques; attack modeling; attack scenarios; e-graphs; exploitation graphs; exploitation similarity; high-performance cluster computing; host connection similarity; network security; network vulnerability; system configuration; system vulnerability; vulnerability assessment; vulnerability scanner; Buildings; Computational modeling; Computer networks; Computer security; High performance computing; Information security; Network topology; Sensor systems; Testing; Tree data structures;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC
Print_ISBN :
0-7803-9290-6
Type :
conf
DOI :
10.1109/IAW.2005.1495933
Filename :
1495933
Link To Document :
بازگشت