Attack graph based evaluation of network security

  • Authors:
  • Igor Kotenko;Mikhail Stepashkin

  • Affiliations:
  • SPIIRAS, St.-Petersburg, Russia;SPIIRAS, St.-Petersburg, Russia

  • Venue:
  • CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs (trees, nets), the subsequent checking of various properties of these graphs, and determining security metrics which can explain possible ways to increase security level. The paper suggests a new approach to security evaluation based on comprehensive simulation of malefactor's actions, construction of attack graphs and computation of different security metrics. The approach is intended for using both at design and exploitation stages of computer networks. The implemented software system is described, and the examples of experiments for analysis of network security level are considered.