Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs

@inproceedings{Singhal2011SecurityRA,
  title={Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs},
  author={Anoop Singhal and Xinming Ou},
  year={2011}
}
Today’s information systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. [...] Key Method Attack likelihoods are propagated through the attack graph, yielding a novel way to measure the security risk of enterprise systems. This metric for risk mitigation analysis is used to maximize the security of enterprise systems. This methodology based on probabilistic attack graphs can be used to evaluate and strengthen the overall security of enterprise…Expand
A Quantitative Risk Analysis Model and Simulation Of Enterprise Networks
TLDR
This paper computed network risk as a function of total vulnerabilities exploitation along path and Impact of exploitation, and performs a simulation analysis on an enterprise network to show how total network risk varies with vulnerabilities exploitation scores and impact scores. Expand
A Quantitative Measure of the Security Risk Level of Enterprise Networks
TLDR
A method is devised to quantify the security level of IT networks by electronically scanning the network using the vulnerability scanning tool (Nexpose) and Probabilistic approach is applied to calculate an overall security risk level of sub networks and entire network. Expand
Security Vulnerability Analysis using Ontology-based Attack Graphs
  • Komal Falodiya, M. Das
  • Computer Science
  • 2017 14th IEEE India Council International Conference (INDICON)
  • 2017
TLDR
This paper uses ontology for the attack graph to analyze security vulnerabilities in enterprise network and shows the strengths of the proposed approach while analyzing the network for security vulnerabilities. Expand
Cybersecurity: A Survey of Vulnerability Analysis and Attack Graphs
TLDR
A survey of raised and related topics to the field of vulnerability analysis and attack graphs is presented and the challenges remain in integrating the vulnerability analysis tools in a holistic process that cyber defenders can use to detect an intrusion and respond quickly. Expand
Attack Difficulty Metric for Assessment of Network Security
TLDR
A new security metric based on attack graph, namely Attack Difficulty has been proposed to include this position factor and comparison of this new metric with other attack graph based security metrics has been included to validate its acceptance in real life situations. Expand
Security Modelling and Analysis of Dynamic Enterprise Networks
TLDR
The proposed novel graphical security model named Temporal-Hierarchical Attack Representation Model (T-HARM) is developed to capture network changes and the effect of network change on the existing cyber security metrics are investigated based on the proposed security model. Expand
Automated Generation of Attack Graphs Using NVD
TLDR
A model is defined that evolves over the previous works to depict the requirements of exploiting vulnerabilities for generating attack graphs and it is observed that prerequisite and postcondition privileges can be generated with overall accuracy rates of 88,8 % and 95,7 % with rule-based and machine learning-employed (Multilayer Perceptron) models respectively. Expand
Enhancement of probabilistic attack graphs for accurate cyber security monitoring
  • E. Doynikova, I. Kotenko
  • Computer Science
  • 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)
  • 2017
TLDR
The task of refinement of the attack models in the form of attack graphs is investigated, including inaccuracies in specifying the pre- and postconditions of attack actions, processing of cycles in graphs to apply the Bayesian methods for attack graph analysis, mapping of incidents on attack graph nodes, and automatic countermeasure selection for the nodes under the risk. Expand
A comprehensive approach for network attack forecasting
TLDR
The primary goal of this paper is to present an attack forecasting approach that can predict future network attacks with more precision and dynamically adapts to changes in the environment. Expand
Placement of Sensor using Attack Graph
TLDR
A new type of attack graph is created, the multiple-prerequisite graph, that scales nearly linearly as the size of a typical network increases and is tested on an operational network with over 180 nodes, where it helped to discover a previously unknown configuration error. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 41 REFERENCES
Measuring the Overall Security of Network Configurations Using Attack Graphs
TLDR
This paper presents an attack resistance metric that generalizes a previously proposed metric that is also based on attack graphs and shows that the proposed metric satisfies desired properties and that it adheres to common sense. Expand
An Attack Graph-Based Probabilistic Security Metric
TLDR
This paper proposes an attack graph-based probabilistic metric for network security and studies its efficient computation, and defines and proposes heuristics to improve the efficiency of such computation. Expand
Advanced Vulnerability Analysis and Intrusion Detection through Predictive Attack Graphs
Network security tools generally lack sufficient context for maintaining a well informed and proactive defense posture. Vulnerabilities are usually assessed in isolation, without considering how theyExpand
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describesExpand
Measuring network security using dynamic bayesian network
TLDR
A Dynamic Bayesian Networks-based model is proposed to incorporate temporal factors, such as the availability of exploit codes or patches, for continuously measuring network security in a dynamic environment. Expand
A weakest-adversary security metric for network configuration security analysis
TLDR
A novel quantitative metric for the security of computer networks that is based on an analysis of attack graphs is presented, which measures the security strength of a network in terms of the strength of the weakest adversary who can successfully penetrate the network. Expand
Topological analysis of network attack vulnerability
TLDR
It is shown how attack graphs can be used to compute actual sets of hardening measures that guarantee the safety of given critical resources, and offer a promising solution for administrators to monitor and predict the progress of an intrusion, and take appropriate countermeasures in a timely manner. Expand
Practical Attack Graph Generation for Network Defense
TLDR
A new type of attack graph, the multiple-prerequisite graph, is created that scales nearly linearly as the size of a typical network increases and a prototype system is built using this graph type. Expand
Automated generation and analysis of attack graphs
TLDR
This paper presents an automated technique for generating and analyzing attack graphs, based on symbolic model checking algorithms, letting us construct attack graphs automatically and efficiently. Expand
A Sound and Practical Approach to Quantifying Security Risk in Enterprise Networks ∗
Mitigation of security risk is an important task in enterpri se network security management. However it is presently a skill ac quired by individual experience, more an art than a science. Th biggestExpand
...
1
2
3
4
5
...