Conference item
Attacker-parametrised attack graphs
- Abstract:
- Computer network attackers chain system exploits together to achieve their goals, which range from stealing data to corrupting systems. Attack graphs represent these paths through the network, and provide the basis for calculating many security metrics. In this paper, we seek to extend graph-based analysis from the consideration of single graphs to the consideration of multiple. By performing analysis on many graphs at once, we consider the range of threats faced and avoid the downsides of several current techniques, which focus purely on known and expected attackers. In particular, we propose a novel method of generating a set of attack graphs, parametrised by attacker profiles. Our technique would enable security analysts to consider the security of their network from the perspective of many attackers simultaneously. This contrasts with existing techniques, which typically analyse attacker-independent graphs or graphs constructed around predefined attacker profiles. We analyse the resulting set of graphs first through deterministic methods and then using a probability measure.
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Authors
- Publisher:
- ThinkMind Digital Library
- Host title:
- Tenth International Conference on Quantum, Nano/Bio, and Micro Technologies (ICQNM 2016)
- Publication date:
- 2016-07-01
- Acceptance date:
- 2016-05-14
- Event title:
- International Conference on Quantum, Nano/Bio, and Micro Technologies
- Event location:
- Nice, France
- Event website:
- http://www.iaria.org/conferences2016/ProgramICQNM16.html
- Event start date:
- 2016-07-24
- Event end date:
- 2016-07-28
- Language:
-
English
- Keywords:
- Pubs id:
-
pubs:637379
- UUID:
-
uuid:b156c235-d097-4ba4-bd5a-927833f02ea0
- Local pid:
-
pubs:637379
- Source identifiers:
-
637379
- Deposit date:
-
2016-08-04
Terms of use
- Copyright holder:
- International Academy, Research and Industry Association
- Copyright date:
- 2016
- Rights statement:
- Copyright (c) IARIA, 2016. IARIA grants royalty-free permission to the authors to disseminate the work, under the above provisions, for any academic, commercial, or industrial use. IARIA grants royalty-free permission to any individuals or institutions to make the article available electronically, online, or in print.
If you are the owner of this record, you can report an update to it here: Report update to this record