DocumentCode :
3077307
Title :
Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering
Author :
Li, Wei ; Vaughn, Rayford B.
Author_Institution :
Nova Southeastern University
Volume :
9
fYear :
2006
fDate :
04-07 Jan. 2006
Abstract :
In this paper, we define a process to model and simulate attack scenarios in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are associated to create exploitation graphs (e-graphs) which are used to represent attack scenarios. Experiments carried out in a cluster computing environment showed the usefulness of proposed techniques in providing in-depth attack scenario analyses for security engineering. Critical vulnerabilities can be identified by employing graph algorithms. Several factors were used to measure the difficulty in executing an attack. A cost/benefit analysis was used for more accurate quantitative analysis of attack scenarios. We have also shown how the attack scenario analyses better help deployment of security products and design of network topologies.
Keywords :
Computational modeling; Computer networks; Computer science; Computer security; Computer simulation; Cost benefit analysis; Data security; Electronic mail; Information security; Performance analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
System Sciences, 2006. HICSS '06. Proceedings of the 39th Annual Hawaii International Conference on
ISSN :
1530-1605
Print_ISBN :
0-7695-2507-5
Type :
conf
DOI :
10.1109/HICSS.2006.353
Filename :
1579753
Link To Document :
بازگشت