skip to main content
10.1145/2070425.2070433acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Corporate networks security evaluation based on attack graphs

Published:14 November 2011Publication History

ABSTRACT

Using attack graphs for the security analysis allows to consider the relationship of individual components and their security parameters. It gives more accurate data to assess the security of the system as a whole comparing with investigation of security properties of the individual nodes. This paper describes the calculation of attack graph, analyze the results and evaluate the effectiveness of existing countermeasures. The model allows dynamic routing, filtering on any network object, NAT. States in attack graph are detailed to confidentiality, integrity, availability triad. In constructing the attack graph takes into account both local and network vulnerability. The results of experimental evaluation of system performance presented. For the analysis of 10000 simulated hosts took an average time of about 100 seconds. The number of access control rules (from 500 to 4000 per simulated subnet) were chosen so that the maximum number of filtering rules for devices were about 1,000.

References

  1. ISO / IEC 15408--3:2009.Google ScholarGoogle Scholar
  2. Kyle Ingols, Matthew Chu, Richard Lippmann, Seth Webster, Stephen Boyer, "Modeling Modern Network Attacks and Countermeasures Using Attack Graphs," acsac, pp.117--126, 2009 Annual Computer Security Applications Conference, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.Sushil Jajodia, Steven Noel, "Topological Vulnerability Analysis", Advances in Information Security, 2010, Volume 46, Part 4, pp. 139--154.Google ScholarGoogle Scholar
  4. Common platform enumeration. MITRE. http://cpe.mitre.orgGoogle ScholarGoogle Scholar
  5. Common Vulnerability Scoring System. Forum of Incident Response and Security Teams, Common Vulnerability Scoring System-Special Interest Group. http://www.first.org/cvss/ .Google ScholarGoogle Scholar
  6. http://oval.mitre.org/language/interpreter.html .Google ScholarGoogle Scholar
  7. National Vulnerability Database. http://nvd.nist.gov/download.cfm .Google ScholarGoogle Scholar
  8. Official Common Platform Enumeration Dictionary. http://nvd.nist.gov/cpe.cfm .Google ScholarGoogle Scholar
  9. ISO / IEC 15408--1:2009.Google ScholarGoogle Scholar
  10. Evgeny Abramov, Denis Mordvin, and Oleg Makarevich. 2010. Automated method for constructing of network traffic filtering rules. In Proceedings of the 3rd international conference on Security of information and networks (SIN '10).ACM, New York, NY, USA, 203--211. DOI = 10.1145/1854099.1854141 http://doi.acm.org/10.1145/1854099.1854141 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Common Vulnerabilities and Exposures. MITRE. http://cve.mitre.org/ .Google ScholarGoogle Scholar
  12. L. Yuan et al., "FIREMAN: A toolkit for FIREwall modeling and ANalysis," in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2006, pp. 199--213. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Corporate networks security evaluation based on attack graphs

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SIN '11: Proceedings of the 4th international conference on Security of information and networks
      November 2011
      276 pages
      ISBN:9781450310208
      DOI:10.1145/2070425

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 November 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate102of289submissions,35%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader