An Attack Graph Based Risk Management Approach of an Enterprise LAN

نویسندگان

  • Somak Bhattacharya
  • S. K. Ghosh
چکیده

In today’s large complex enterprise network, security is a challenging task for most of the administrators. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the precondition for subsequent exploits and makes a causal relationship among them. Such a series of exploits constitutes an attack path and the set of all possible attack paths form an attack graph. Even the well administered networks are susceptible to such attacks as present day vulnerability scanners are only able to identify the vulnerabilities in isolation but there is a need for logical formalism and correlation among these vulnerabilities within a host or across multiple hosts to identify overall risk of the network. In this paper we propose a novel approach by map this problem in artificial intelligence domain and find out an attack path consisting of logically connected exploits, which essentially shows the minimum number of exploits required to gain access over a critical network resource. The solution is further extended to form an attack graph and find out the set of vulnerabilities which are the root cause for overall security threat towards enterprise network. The inherent time and scalability problem of attack graph generation is also taken care of in this approach. Once the set of vulnerabilities has been identified for rectification, the network administrator can then prioritize the vulnerability rectification procedure to make the network secure.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enterprise-Wide Risk Management (EWRM) as a Value Added Tool in Enhancing the Economic Value of Business Enterprises

In recent years, Risk Management in respect of Enterprise-Wide Risk Management (EWRM) has become more important and highly critical to major corporations worldwide including Malaysia. In fact, it is interesting to note that when the Government of Malaysia passed the Code of Corporate Governance in the year 2000, most of the Public Limited Companies (PLCs) in Malaysia was struggling to implement...

متن کامل

Providing an Enterprise Architecture Framework Model for Laboratory Information Management Systems by Service Oriented Approach

Background and Aim: Laboratories are one of the most important scientific and research centers. Laboratory information management systems provide a platform for recording the information and collaborating between researchers. The main purpose of this study was suggesting an organizational architecture model of laboratory information management systems.  Materials and Methods: This study was a ...

متن کامل

Reputation Risk Management in the Framework of Enterprise Risk Management: Evidences from an Active Financial Institution in the Capital Market of Iran

Reputation risk as one of the most important risks in any competitive industry and market should be considered before all the risks of the enterprise which also affects other risks. This research aims to review and manage reputation risk in the framework of enterprise risk management. Considering the importance of the subject and lack of available studies in this field, the innovation of presen...

متن کامل

Enterprise Risk Management and Performance of Financial Institutions in Iraq: The Mediating Effect of Information Technology Quality

Enterprise risk management represents a process of assessing exposure to risks in an institution. It is a systematic mechanism and a comprehensive tool for predicting events, including unexpected events, and their impacts. This paper is a conceptual study. It aims at designing a model for testing the mediation effect of information technology (IT) quality on the relationship between the enterpr...

متن کامل

Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach

Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008