Effective Network Vulnerability Assessment through Model Abstraction
نویسندگان
چکیده
A significant challenge in evaluating network security stems from the scale of modern enterprise networks and the vast number of vulnerabilities regularly found in software applications. A common technique to deal with this complexity is attack graphs, where a tool automatically computes all possible ways a system can be broken into by analyzing the configuration of each host, the network, and the discovered vulnerabilities. Past work has proposed methodologies that post-process “raw” attack graphs so that the result can be abstracted and becomes easier for a human user to grasp. We notice that, while visualization is a major problem caused by the multitude of attack paths in an attack graph, a more severe problem is the distorted risk picture it renders to both human users and quantitative vulnerability assessment models. We propose that abstraction be done before attack graphs are computed, instead of after. This way we can prevent the distortion in quantitative vulnerability assessment metrics, at the same time improving visualization as well. We developed an abstract network model generator that, given reachability and configuration information of a network, provides an abstracted model with much more succinct information about the system than the raw model. The model is generated by grouping hosts based on their network reachability and vulnerability information, as well as grouping vulnerabilities with similar exploitability. We show that the attack graphs generated from this type of abstracted inputs are not only much smaller, but also provide more realistic quantitative vulnerability metrics for the whole system. We conducted experiments on both synthesized and production systems to demonstrate the effectiveness of our approach.
منابع مشابه
Urban Texture Assessment Bbased on the Principles of Passive Defense Using Factor Analytical Network Process (F’ANP) (Casestudy : Noghan Neighborhood Mashhad)
Background and Aims: Urban texture assessment with passive defense approach is one of the most important issues in the field of urban planning. In this research, we try to evaluate the vulnerability of urban tissue to the enemy's threats, because inactive defense by using unarmed measures reduces Vulnerability and increased deterrence at the time of the threat. Noghan Neighborhood located in th...
متن کاملUnderground transportation system risk assessment to mitigate vulnerability against natural disasters through intelligent urban management
Quantitative and qualitative monitoring and evaluation of risk management programs will play an important role in the development of Tehran metropolitan railway transport. Considering the tectonic studies, seismic zones, land degradation and faults in north and south of Tehran, the development of underground railway lines, the assessment of the vulnerability of subway stations and the escalatio...
متن کاملVulnerability Assessment of Information System based on Weighted Directional Graph and Complex Network Technology
Bayesian equilibrium algorithm model of information vulnerability assessment was established, and it had introduced the weighted directional method in the model. Then it established an information system evaluation program for complex network, and designed the procedures of vulnerability assessment. In order to verify the validity and reliability of the model, complex network test platform was ...
متن کاملVulnerability Evaluation of Multimedia Subsystem Based on Complex Network
IP multimedia subsystems bring huge security threats to the IMS-based next-generation networks although they bring IMS-based network integration and business ability enhancement. Therefore, the research on the vulnerability of IP multimedia subsystems attracts widespread attention recently. In this article, the security threats of next-generation core networks are discussed first. And then we a...
متن کاملA Model for Vulnerability Analysis and Classification
In this paper, we present a model for vulnerability analysis that enables us to mitigate the complexity of modern systems through well-defined layers of abstraction. We use this model to build a new framework for vulnerability classification. Finally, we present our results classifying buffer overflow vulnerabilities.
متن کامل