skip to main content
10.1145/1229285.1229288acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
Article

Topological analysis of network attack vulnerability

Published: 20 March 2007 Publication History

Abstract

This talk will discuss issues and methods for survivability of systems under malicious attacks. To protect from such attacks, it is necessary to take steps to prevent attacks from succeeding. At the same time, it is important to recognize that not all attacks can be averted at the outset; attacks that are successful to some degree must be recognized as unavoidable and comprehensive support for identifying and responding to attacks is required.In my talk, I will describe the recent research on attack graphs that represent known attack sequences attackers can use to penetrate computer networks. I will show how attack graphs can be used to compute actual sets of hardening measures that guarantee the safety of given critical resources. Attack graphs can also be used to correlate received alerts, hypothesize missing alerts, and predict future alerts, all at the same time. Thus, they offer a promising solution for administrators to monitor and predict the progress of an intrusion, and take appropriate countermeasures in a timely manner.

Cited By

View all
  • (2024)A Metalanguage for Dynamic Attack Graphs and Lazy GenerationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664508(1-11)Online publication date: 30-Jul-2024
  • (2023)A Survey of MulVAL Extensions and Their Attack Scenarios CoverageIEEE Access10.1109/ACCESS.2023.325772111(27974-27991)Online publication date: 2023
  • (2019)A Study of Security Vulnerabilities and Software Weaknesses in VehiclesSecure IT Systems10.1007/978-3-030-35055-0_13(204-218)Online publication date: 13-Nov-2019
  • Show More Cited By

Index Terms

  1. Topological analysis of network attack vulnerability

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security
      March 2007
      323 pages
      ISBN:1595935746
      DOI:10.1145/1229285
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 20 March 2007

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Article

      Conference

      Asia CCS07
      Sponsor:

      Acceptance Rates

      ASIACCS '07 Paper Acceptance Rate 33 of 180 submissions, 18%;
      Overall Acceptance Rate 418 of 2,322 submissions, 18%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)10
      • Downloads (Last 6 weeks)3
      Reflects downloads up to 16 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A Metalanguage for Dynamic Attack Graphs and Lazy GenerationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664508(1-11)Online publication date: 30-Jul-2024
      • (2023)A Survey of MulVAL Extensions and Their Attack Scenarios CoverageIEEE Access10.1109/ACCESS.2023.325772111(27974-27991)Online publication date: 2023
      • (2019)A Study of Security Vulnerabilities and Software Weaknesses in VehiclesSecure IT Systems10.1007/978-3-030-35055-0_13(204-218)Online publication date: 13-Nov-2019
      • (2018)AGQL: A Query Language for Attack Graph based Network Vulnerability Analysis2018 Fifth International Conference on Emerging Applications of Information Technology (EAIT)10.1109/EAIT.2018.8470430(1-4)Online publication date: Jan-2018
      • (2018)From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacksEvolving Systems10.1007/s12530-018-9234-z11:3(479-490)Online publication date: 22-May-2018
      • (2017)Model-Based Quantitative Network Security Metrics: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2017.274550519:4(2704-2734)Online publication date: Dec-2018
      • (2015)Difficulty-level metric for cyber security training2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision10.1109/COGSIMA.2015.7108194(172-178)Online publication date: Mar-2015
      • (2015)An empirical test of the accuracy of an attack graph analysis toolInformation & Computer Security10.1108/ICS-06-2014-003623:5(516-531)Online publication date: 9-Nov-2015
      • (2012)Experience-based cyber situation recognition using relaxable logic patterns2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support10.1109/CogSIMA.2012.6188392(243-250)Online publication date: Mar-2012
      • (2011)Indices of power in optimal IDS default configurationProceedings of the Second international conference on Decision and Game Theory for Security10.1007/978-3-642-25280-8_3(7-21)Online publication date: 14-Nov-2011
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media