Mapping evidence graphs to attack graphs | IEEE Conference Publication | IEEE Xplore

Mapping evidence graphs to attack graphs


Abstract:

Attack graphs compute potential attack paths from a system configuration and known vulnerabilities of a system. Evidence graphs model intrusion evidence and dependencies ...Show More

Abstract:

Attack graphs compute potential attack paths from a system configuration and known vulnerabilities of a system. Evidence graphs model intrusion evidence and dependencies among them. In this paper, we show how to map evidence graphs to attack graphs. This mapping is useful for application of attack graphs and evidence graphs for forensic analysis. In addition to helping to refine attack graphs by using known sets of dependent attack evidence, important probabilistic information contained in evidence graphs can be used to compute or refine potential attack success probabilities obtained from repositories like CVSS. Conversely, attack graphs can be used to add missing evidence or remove irrelevant evidence trails to build a complete evidence graph. We illustrated the mapping by using a database attack as a case study.
Date of Conference: 02-05 December 2012
Date Added to IEEE Xplore: 17 January 2013
ISBN Information:

ISSN Information:

Conference Location: Costa Adeje, Spain

References

References is not available for this document.