Abstract
We have presented an approach to aggregating vulnerability metrics in an enterprise network through attack graphs. Our approach is sound in that, given component metrics which characterize the likelihood that individual vulnerabilities can be successfully exploited, the model computes a numeric value representing the cumulative likelihood for an attacker to succeed in gaining a specific privilege or carrying out an attack in the network. This method can be used to help system administrators decide between risk mitigation options.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Nessus vulnerability scanner. http://www.nessus.org.
Redseal systems. http://www.redseal.net/.
Retina security scanner. http://www.eeye.com/.
Skybox security. http://www.skyboxsecurity.com/.
The systems security engineering capability maturity model. http://www.ssecmm. org/index.html.
Ehab Al-Shaer, Latif Khan, and M. Salim Ahmed. A comprehensive objective network security metric framework for proactive security configuration. In ACM Cyber Security and Information Intelligence Research Workshop, 2008.
Paul Ammann, Duminda Wijesekera, and Saket Kaushik. Scalable, graph-based network vulnerability analysis. In Proceedings of 9th ACM Conference on Computer and Communications Security, Washington, DC, November 2002.
Zahid Anwar, Ravinder Shankesi, and Roy H. Campbell. Automatic security assessment of critical cyber-infrastructures. In Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), July 2008.
Davide Balzarotti, Mattia Monga, and Sabrina Sicari. Assessing the risk of using vulnerable components. In Proceedings of the 2nd ACM workshop on Quality of Protection, 2005.
Elizabeth Chew, Marianne Swanson, Kevin Stine, Nadya Bartol, Anthony Brown, and Will Robinson. Performance Measurement Guide for Information Security. National Institute of Standards and Technology, July 2008. NIST Special Publication 800–55 Revision 1.
F. Cuppens and R. Ortalo. Lambda: A language to model a database for detection of attacks. In Proceedings of the Workshop on Recent Advances in Intrusion Detection, 2000.
J. Dawkins and J. Hale. A systematic approach to multi-stage network attack analysis. In Proceedings of Second IEEE International Information Assurance Workshop, pages 48 – 56, April 2004.
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, and Darrell Whitley. Optimal security hardening using multi-objective optimization on attack tree models of networks. In 14th ACM Conference on Computer and Communications Security (CCS), 2007.
Marcel Frigault and LingyuWang. Measuring network security using Bayesian network-based attack graphs. In Proceedings of the 3rd IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA’08), 2008.
Marcel Frigault, Lingyu Wang, Anoop Singhal, and Sushil Jajodia. Measuring network security using dynamic Bayesian network. In Proceedings of the 4th ACM workshop on Quality of Protection, 2008.
John Homer and Xinming Ou. SAT-solving approaches to context-aware enterprise network security management. IEEE JSAC Special Issue on Network Infrastructure Configuration, 27(3), April 2009.
John Homer, Xinming Ou, and David Schmidt. A sound and practical approach to quantifying security risk in enterprise networks. Technical report, Kansas State University, 2009.
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth Webster, and Stephen Boyer. Modeling modern network attacks and countermeasures using attack graphs. In 25th Annual Computer Security Applications Conference (ACSAC), 2009.
Kyle Ingols, Richard Lippmann, and Keith Piwowarski. Practical attack graph generation for network defense. In 22nd Annual Computer Security Applications Conference (ACSAC), Miami Beach, Florida, December 2006.
Sushil Jajodia, Steven Noel, and Brian O’Berry. Topological analysis of network attack vulnerability. In V. Kumar, J. Srivastava, and A. Lazarevic, editors, Managing Cyber Threats:
Issues, Approaches and Challanges, chapter 5. Kluwer Academic Publisher, 2003.
A. Jaquith. Security Metrics: Replacing Fear, Uncertainty, and Doubt. Addison Wesley, 2007.
Somesh Jha, Oleg Sheyner, and Jeannette M. Wing. Two formal analyses of attack graphs. In Proceedings of the 15th IEEE Computer Security Foundations Workshop, pages 49–63, Nova Scotia, Canada, June 2002.
Daniel Geer Jr., Kevin Soo Hoo, and Andrew Jaquith. Information security: Why the future belongs to the quants. IEEE SECURITY & PRIVACY, 2003.
Wei Li, Rayford B. Vaughn, and Yoginder S. Dandass. An approach to model network exploitations using exploitation graphs. SIMULATION, 82(8):523–541, 2006.
Richard Lippmann, Kyle Ingols, Chris Scott, Keith Piwowarski, Kendra Kratkiewicz, Mike Artz, and Robert Cunningham. Validating and restoring defense in depth using attack graphs. In Military Communications Conference (MILCOM),Washington, DC, U.S.A., October 2006.
Richard Lippmann and Kyle W. Ingols. An annotated review of past papers on attack graphs. Technical report, MIT Lincoln Laboratory, March 2005.
Richard P. Lippmann, Kyle W. Ingols, Chris Scott, Keith Piwowarski, Kendra Kratkiewicz, Michael Artz, and Robert Cunningham. Evaluating and strengthening enterprise network security using attack graphs. Technical Report ESC-TR-2005-064, MIT Lincoln Laboratory, October 2005.
Pratyusa Manadhata, Jeannette Wing, Mark Flynn, and Miles McQueen. Measuring the attack surfaces of two FTP daemons. In Proceedings of the 2nd ACM workshop on Quality of Protection, 2006.
John McHugh. Quality of protection: measuring the unmeasurable? In Proceedings of the 2nd ACM workshop on Quality of Protection (QoP), Alexandria, Virginia, USA, 2006.
John McHugh and James Tippett, editors. Workshop on Information-Security-System Rating and Ranking (WISSRR). Applied Computer Security Associates, May 2001.
PeterMell, Karen Scarfone, and Sasha Romanosky. A Complete Guide to the Common Vulnerability Scoring System Version 2.0. Forum of Incident Response and Security Teams (FIRST), June 2007.
National Institute of Standards and Technology. Technology assessment: Methods for measuring the level of computer security, 1985. NIST Special Publication 500–133.
S. Noel and J. Jajodia. Understanding complex network attack graphs through clustered adjacency matrices. In Proceedings of the 21st Annual Computer Security Applications Conference, 2005.
S. Noel and S. Jajodia. Proactive intrusion prevention and response via attack graphs. In Ryan Trost, editor, Practical Intrusion Detection. Addison-Wesley Professional, 2009.
Steven Noel and Sushil Jajodia. Managing attack graph complexity through visual hierarchical aggregation. In VizSEC/DMSEC ’04: Proceedings of the 2004 ACMworkshop on Visualization and data mining for computer security, pages 109–118, New York, NY, USA, 2004. ACM Press.
Steven Noel, Sushil Jajodia, Brian O’Berry, and Michael Jacobs. Efficient minimum-cost network hardening via exploit dependency graphs. In 19th Annual Computer Security Applications Conference (ACSAC), December 2003.
Xinming Ou. A logic-programming approach to network security analysis. PhD thesis, Princeton University, 2005.
Xinming Ou, Wayne F. Boyer, and Miles A. McQueen. A scalable approach to attack graph generation. In 13th ACM Conference on Computer and Communications Security (CCS), pages 336–345, 2006.
Xinming Ou, Sudhakar Govindavajhala, and Andrew W. Appel. MulVAL: A logic-based network security analyzer. In 14th USENIX Security Symposium, 2005.
Joseph Pamula, Sushil Jajodia, Paul Ammann, and Vipin Swarup. A weakest-adversary security metric for network configuration security analysis. In Proceedings of the 2nd ACM workshop on Quality of Protection, 2006.
Cynthia Phillips and Laura Painton Swiler. A graph-based system for network-vulnerability analysis. In NSPW ’98: Proceedings of the 1998 workshop on New security paradigms, pages 71–79. ACM Press, 1998.
Prasad Rao, Konstantinos F. Sagonas, Terrance Swift, David S. Warren, and Juliana Freire. XSB: A system for efficiently computing well-founded semantics. In Proceedings of the 4th International Conference on Logic Programming and Non-Monotonic Reasoning (LPNMR’ 97), pages 2–17, Dagstuhl, Germany, July 1997. Springer Verlag.
R. Ritchey and P. Ammann. Using model checking to analyze network vulnerabilities. In Proceedings of the IEEE Symposium on Security and Privacy, 2000.
Diptikalyan Saha. Extending logical attack graphs for efficient vulnerability analysis. In Proceedings of the 15th ACM conference on Computer and Communications Security (CCS), 2008.
Mohamed Salim, Ehab Al-Shaer, and Latif Khan. A novel quantitative approach for measuring network security. In INFOCOM 2008 Mini Conference, 2008.
Oleg Sheyner. Scenario Graphs and Attack Graphs. PhD thesis, Carnegie Mellon, April 2004.
Oleg Sheyner, Joshua Haines, Somesh Jha, Richard Lippmann, and Jeannette M.Wing. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 254–265, 2002.
G. Stoneburner, C. Hayden, and A Feringa. Engineering principles for information technology security. Technical Report 800–27 (Rev A), National Institute of Standards and Technology, June 2004.
M. Swanson, N. Bartol, J. Sabato, J Hash, and L. Graffo. Security metrics guide for information technology systems. Technical Report 800–55, National Institute of Standards and Technology, July 2003.
Laura P. Swiler, Cynthia Phillips, David Ellis, and Stefan Chakerian. Computer-attack graph generation tool. In DARPA Information Survivability Conference and Exposition (DISCEX II’01), volume 2, June 2001.
Steven J. Templeton and Karl Levitt. A requires/provides model for computer attacks. In Proceedings of the 2000 workshop on New security paradigms, pages 31–38. ACM Press, 2000.
T. Tidwell, R. Larson, K. Fitch, and J. Hale. Modeling Internet attacks. In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY, June 2001.
L.Wang, A. Singhal, and S. Jajodia. Measuring the overall security of network configurations using attack graphs. In Proceedings of the 21st IFIP WG 11.3 Working Conference on Data and Applications Security. Springer-Verlag, 2007.
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, and Sushil Jajodia. An attack graphbased probabilistic security metric. In Proceedings of The 22nd Annual IFIP WG 11.3Working Conference on Data and Applications Security (DBSEC’08), 2008.
LingyuWang, Steven Noel, and Sushil Jajodia. Minimum-cost network hardening using attack graphs. Computer Communications, 29:3812–3824, November 2006.
Lingyu Wang, Anoop Singhal, and Sushil Jajodia. Measuring network security using attack graphs. In Third Workshop on Quality of Protection (QoP), 2007.
Lingyu Wang, Anoop Singhal, and Sushil Jajodia. Measuring the overall security of network configurations using attack graphs. In Proceedings of 21th IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC’07), 2007.
Anming Xie, Zhuhua Cai, Cong Tang, Jianbin Hu, and Zhong Chen. Evaluating network security with two-layer attack graphs. In 25th Annual Computer Security Applications Conference (ACSAC), 2009.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2012 The Author(s)
About this chapter
Cite this chapter
Ou, X., Singhal, A. (2012). Conclusion. In: Quantitative Security Risk Assessment of Enterprise Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1860-3_5
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1860-3_5
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-1859-7
Online ISBN: 978-1-4614-1860-3
eBook Packages: Computer ScienceComputer Science (R0)