Advertisement

Network Hardening

An Automated Approach to Improving Network Security

  • Lingyu Wang
  • Massimiliano Albanese
  • Sushil Jajodia

Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Table of contents

  1. Front Matter
    Pages i-viii
  2. Lingyu Wang, Massimiliano Albanese, Sushil Jajodia
    Pages 1-4
  3. Lingyu Wang, Massimiliano Albanese, Sushil Jajodia
    Pages 5-13
  4. Lingyu Wang, Massimiliano Albanese, Sushil Jajodia
    Pages 15-22
  5. Lingyu Wang, Massimiliano Albanese, Sushil Jajodia
    Pages 23-38
  6. Lingyu Wang, Massimiliano Albanese, Sushil Jajodia
    Pages 39-58
  7. Lingyu Wang, Massimiliano Albanese, Sushil Jajodia
    Pages 59-60

About this book

Introduction

This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means of network defense than relying solely on the experience and skills of a human analyst. Key background information on attack graphs and network hardening helps readers understand the complexities of these tools and techniques. A common network hardening technique generates hardening solutions comprised of initially satisfied conditions, thereby making the solution more enforceable. Following a discussion of the complexity issues in this technique, the authors provide an improved technique that considers the dependencies between hardening options and employs a near-optimal approximation algorithm to scale linearly with the size of the inputs. Also included are automated solutions for hardening a network against sophisticated multi-step intrusions. Network Hardening: An Automated Approach to Improving Network Security is a valuable resource for researchers and professionals working in network security. It is also a useful tool for advanced-level students focused on security in computer science and electrical engineering.

Keywords

Attack graph Intrusion prevention Network hardening Network security Penetration testing Vulnerability analysis

Authors and affiliations

  • Lingyu Wang
    • 1
  • Massimiliano Albanese
    • 2
  • Sushil Jajodia
    • 3
  1. 1.Concordia Institute for Information Systems Engineering (CIISE)Concordia UniversityMontrealCanada
  2. 2.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA
  3. 3.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-04612-9
  • Copyright Information The Author(s) 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-04611-2
  • Online ISBN 978-3-319-04612-9
  • Series Print ISSN 2191-5768
  • Series Online ISSN 2191-5776
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering