skip to main content
10.1145/2684464.2684494acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article

NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks

Authors Info & Claims
Published:04 January 2015Publication History

ABSTRACT

Sophisticated cyber-attacks have become prominent with the growth of the Internet and web technology. Such attacks are multi-stage ones, and correlate vulnerabilities on intermediate hosts to compromise an otherwise well-protected critical resource. Conventional security assessment approaches can leave out some complex scenarios generated by these attacks. In the literature, these correlated attacks have been modeled using attack graphs. Although a few attack graph-based network security assessment tools are available, they are either commercial products or developed using proprietary databases. In this paper, we develop a customized tool, NetSecuritas, which implements a novel heuristic-based attack graph generation algorithm and integrates different phases of network security assessment. NetSecuritas leverages open-source libraries, tools and publicly available databases. A cost-driven mitigation strategy has also been proposed to generate network security recommendations. Experimental results establish the efficacy of both attack graph generation and mitigation approach.

References

  1. Ammann, P., Wijesekera, D., and Kaushik, S. Scalable, graph-based network vulnerability analysis. In Proceedings of CCS 2002: 9th ACM Conference on Computer and Communications Security (2002), ACM Press, pp. 217--224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Artz, M. NetSPA: A Network Security Planner. PhD thesis, Massachusettes Institute of Technology, May 2002.Google ScholarGoogle Scholar
  3. Chen, F., Su, J., and Zhang, Y. A scalable approach to full attack graphs generation. In Engineering Secure Software and Systems, F. Massacci, J. Redwine, SamuelT., and N. Zannone, Eds., vol. 5429 of Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009, pp. 150--163. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cynthia Phillips, L. P. S. A graph based system for network-vulnerability analysis. NSPW 98 Proceedings of the 1998 workshop on New Security Paradigms, ACM, pp. 71--79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dawkins, J., and Hale, J. A systematic approach to multi-stage network attack analysis. In Proceedings of the Second IEEE Internation Information Assurance Workshop (IWIA '04) (2004), IEEE Computer Society, pp. 48--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ghosh, N., and Ghosh, S. A planner-based approach to generate and analyze minimal attack graph. Applied Intelligence 36 (2012), 369--390. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ingols, K., Lippmann, R., and Piwowarski, K. Practical attack graph generation for network defense. In Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC '06) (December 2006), pp. 121--130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jajodia, S., Noel, S., and O'Berry, B. Topological analysis of network attack vulnerability. In Managing Cyber Threats: Issues, Approaches and Challenges (2005), vol. V, Springer US, pp. 247--266.Google ScholarGoogle ScholarCross RefCross Ref
  9. Jha, S., Sheyner, O., and J. Wing. Two formal analyses of attack graphs. Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW02). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Lingyu Wang, Anyi Liu, S. J. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communication 29, Issue15 (September 2006), 2917--2933. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Liu, X., Fang, C., Xiao, D., and Xu, H. A goal-oriented approach for modeling and analyzing attack graph. In Information Science and Applications (ICISA), 2010 International Conference on (April 2010), pp. 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  12. Noel, S., Jajodia, S., O'Berry, B., and Jacobs, M. Efficient minimum-cost network hardening via exploit dependency graph. In Proceedings of 19th Annual Computer Security Applications Conference (ACSAC 2003) (2003), pp. 86--95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ortalo, R., Deswarte, Y., and Kanniche, M. Experimenting with quantitative evaluation tools for monitoring operational security. In IEEE Transactions on Software Engineering, 25(5) (October 1999), pp. 633--650. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ou, X., Govindavajhala, S., and Appel, A. W. Mulval: A logic-based network security analyzer. In Proceedings of the 14th USENIX Security Symposium (July 31 -- August 5 2005), pp. 113--128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Phillips, C., and Swiler, L. P. A graph-based system for network-vulnerability analysis. In Proceedings of the Workshop on New Security Paradigms (NSPW) (22-26 September 1998), pp. 71--79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Poolsappasit, N., Dewri, R., and Ray, I. Dynamic security risk management using bayesian attack graphs. Dependable and Secure Computing, IEEE Transactions on 9, 1 (2012), 61--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Ritchey, R. W., and Ammann, P. Using model checking to analyze network vulnerabilities. In Proceedings of the 2000 IEEE Symposium on Security and Privacy (May 2000), pp. 156--165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Schiffman, M. Common vulnerability scoring system (cvss). http://www.first.org/cvss/ (accessed on October 2014).Google ScholarGoogle Scholar
  19. Sheynar, O., Jha, S., Wing, J. M., Lippmann, R. P., and Haines, J. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy (2002), pp. 273--284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Swiler, L. P., Phillips, C., Ellis, D., and Chakerian, S. Computer-attack graph generation tool. In Proceedings of the 2nd DARPA Information Survivability Conference & Exposition (DISCEX II) (2001), vol. II, IEEE Computer Society, pp. 307--321.Google ScholarGoogle ScholarCross RefCross Ref
  21. Templeton, S., and Levitt, K. A requires/provides model for computer attacks. In Proceedings of the 2000 Workshop on New Security Paradigms (18-21 September 2001), ACM Press, pp. 31--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Tidwell, T., Larson, R., K. Fitch, and Hale, J. Modelling internet attacks. In Proceedings of the Second Annual IEEE SMC Information Assurance Workshop (June 2001), IEEE Press, pp. 54--59.Google ScholarGoogle Scholar
  23. Wang, L., Noel, S., and Jajodia, S. Minimum cost-network hardening using attack graphs. Computer Communications, 29(18) (November 2006), 3812--3824. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Williams, L., Lippmann, R., and Ingols, K. An interactive attack graph cascade and reachability display. VizSEC 2007 (2008), 221--236.Google ScholarGoogle Scholar
  25. Williams, L., Lippmann, R., and Ingols, K. GARNET: A graphical attack graph and reachability network evaluation tool. Visualization for Computer Security (2008), 44--59. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICDCN '15: Proceedings of the 16th International Conference on Distributed Computing and Networking
      January 2015
      360 pages
      ISBN:9781450329286
      DOI:10.1145/2684464

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 January 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader