A Systematic Approach to Multi-Stage Network Attack Analysis

  • Authors:
  • Jerald Dawkins;John Hale

  • Affiliations:
  • -;-

  • Venue:
  • IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Network security analysis must coordinate diversesources of information to support effective security models.The modeling process must capture security-relevantinformation about targets and attackers. By capturingthe trust relationships, vulnerabilities, and attackercapabilities, a security analyst can define and characterizecomplex, multi-stage attacks. Along with conductingsystematic analyses on multi-stage attacks, the opportunityalso exists to facilitate large scale detection and visualizationof security events by embedding modelingand analytical components within a more expansive securityframework. This paper presents a formalism andmethodology for multi-stage network attack analysis. Applicationsto network security management, including anetwork vulnerability analyzer prototype, are also described.