Modeling Modern Network Attacks and Countermeasures Using Attack Graphs

Honolulu, HI(2009)

引用 340|浏览2
暂无评分
摘要
By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements to the NetSPA attack graph system required to model additional present-day threats (zero-day exploits and client-side attacks) and countermeasures (intrusion prevention systems, proxy firewalls, personal firewalls, and host-based vulnerability scans). Point-to-point reachability algorithms and structures were extensively redesigned to support "reverse" reachability computations and personal firewalls. Host-based vulnerability scans are imported and analyzed. Analysis of an operational network with 84 hosts demonstrates that client-side attacks pose a serious threat. Experiments on larger simulated networks demonstrated that NetSPA's previous excellent scaling is maintained. Less than two minutes are required to completely analyze a four-enclave simulated network with more than 40,000 hosts protected by personal firewalls.
更多
查看译文
关键词
authorisation,computer network security,graph theory,reachability analysis,NetSPA attack graph system,client-side attack,enterprise networks risk measurement,host based vulnerability scan,intrusion prevention system,modeling modern network attack,personal firewall,point-to-point reachability algorithm,proxy firewall,reverse reachability computation,zero-day exploit,SCAP,attack graph,attack tree,network defense,network reachability,
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要