skip to main content
10.1145/1501434.1501437acmotherconferencesArticle/Chapter ViewAbstractPublication PagespstConference Proceedingsconference-collections
research-article

Topological analysis of network attack vulnerability

Published: 30 October 2006 Publication History

Abstract

This talk will discuss issues and methods for survivability of systems under malicious attacks. To protect from such attacks, it is necessary to take steps to prevent attacks from succeeding. At the same time, it is important to recognize that not all attacks can be averted at the outset; attacks that are successful to some degree must be recognized as unavoidable and comprehensive support for identifying and responding to attacks is required.
In my talk, I will describe the recent research on attack graphs that represent known attack sequences attackers can use to penetrate computer networks. I will show how attack graphs can be used to compute actual sets of hardening measures that guarantee the safety of given critical resources. Attack graphs can also be used to correlate received alerts, hypothesize missing alerts, and predict future alerts, all at the same time. Thus, they offer a promising solution for administrators to monitor and predict the progress of an intrusion, and take appropriate countermeasures in a timely manner.

Cited By

View all
  • (2024)IoTWarden: A Deep Reinforcement Learning Based Real-Time Defense System to Mitigate Trigger-Action IoT Attacks2024 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC57260.2024.10570786(1-6)Online publication date: 21-Apr-2024
  • (2024)IoTHaven: An Online Defense System to Mitigate Remote Injection Attacks in Trigger-action IoT Platforms2024 IEEE 30th International Symposium on Local and Metropolitan Area Networks (LANMAN)10.1109/LANMAN61958.2024.10621894(15-20)Online publication date: 10-Jul-2024
  • (2022)Network attack evaluation model based on directed weighted complex network and fuzzy AHP methodITM Web of Conferences10.1051/itmconf/2022450200945(02009)Online publication date: 19-May-2022
  • Show More Cited By
  1. Topological analysis of network attack vulnerability

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    PST '06: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
    October 2006
    389 pages
    ISBN:1595936041
    DOI:10.1145/1501434
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 October 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Conference

    PST06
    PST06: International Conference on Privacy, Security and Trust
    October 30 - November 1, 2006
    Ontario, Markham, Canada

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)IoTWarden: A Deep Reinforcement Learning Based Real-Time Defense System to Mitigate Trigger-Action IoT Attacks2024 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC57260.2024.10570786(1-6)Online publication date: 21-Apr-2024
    • (2024)IoTHaven: An Online Defense System to Mitigate Remote Injection Attacks in Trigger-action IoT Platforms2024 IEEE 30th International Symposium on Local and Metropolitan Area Networks (LANMAN)10.1109/LANMAN61958.2024.10621894(15-20)Online publication date: 10-Jul-2024
    • (2022)Network attack evaluation model based on directed weighted complex network and fuzzy AHP methodITM Web of Conferences10.1051/itmconf/2022450200945(02009)Online publication date: 19-May-2022
    • (2021)Research Progress and Future Trend Analysis of Network Security Situational AwarenessMobile Multimedia Communications10.1007/978-3-030-89814-4_39(537-549)Online publication date: 2-Nov-2021
    • (2020)Research on Automatic Generation and Analysis Technology of Network Attack Graph2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)10.1109/BigDataSecurity-HPSC-IDS49724.2020.00033(133-139)Online publication date: May-2020
    • (2018)Situation Awareness for Cyber-Physical System: A Case Study of Advanced Metering Infrastructure2018 IEEE International Conference on Prognostics and Health Management (ICPHM)10.1109/ICPHM.2018.8448886(1-6)Online publication date: Jun-2018
    • (2016)Quantitative threat situation assessment based on alert verificationSecurity and Communication Networks10.1002/sec.14739:13(2135-2142)Online publication date: 10-Sep-2016
    • (2006)A scalable approach to attack graph generationProceedings of the 13th ACM conference on Computer and communications security10.1145/1180405.1180446(336-345)Online publication date: 30-Oct-2006
    • (2006)Understanding multistage attacks by attack-track based visualization of heterogeneous event streamsProceedings of the 3rd international workshop on Visualization for computer security10.1145/1179576.1179578(1-6)Online publication date: 3-Nov-2006

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media