An Approach to Model Network Exploitations Using Exploitation Graphs
نویسندگان
چکیده
In this article, a modeling process is defined to address challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are considered to create exploitation graphs (e-graphs) that are used to represent attack scenarios. Experiments carried out in a cluster computing environment showed the usefulness of proposed techniques in providing in-depth attack scenario analyses for security engineering. Critical vulnerabilities can be identified by employing graph algorithms. Several factors were used to measure the difficulty in executing an attack. A cost/benefit analysis was used for more accurate quantitative analysis of attack scenarios. The authors also show how the attack scenario analyses better help deployment of security products and design of network topologies.
منابع مشابه
The exploitation of “Grade of Membership (GoM) model” and “Combined Analysis method” in analysing of urban dynamics and urban hierarchy in Khorasan region (1956-2016)
Concerning the importance of urban network studies and the role of hierarchy system in population decentralization in metropolitan areas, this paper by using acknowledged indicators and Grade of Membership (GoM) model and using Combined Analysis method has tried to find the changes in urban hierarchy of Khorasan region during the period 1956-2016. The outcomes show that urban system in Khorasan...
متن کاملAn Integer Programming Model and a Tabu Search Algorithm to Generate α-labeling of Special Classes of Quadratic Graphs
First, an integer programming model is proposed to find an α-labeling for quadratic graphs. Then, a Tabu search algorithm is developed to solve large scale problems. The proposed approach can generate α-labeling for special classes of quadratic graphs, not previously reported in the literature. Then, the main theorem of the paper is presented. We show how a problem in graph theory c...
متن کاملRisk Analysis of Operating Room Using the Fuzzy Bayesian Network Model
To enhance Patient’s safety, we need effective methods for risk management. This work aims to propose an integrated approach to risk management for a hospital system. To improve patient’s safety, we should develop flexible methods where different aspects of risk and type of information are taken into consideration. This paper proposes a fuzzy Bayesian network to model and analyze risk in the op...
متن کاملA Neural-Network Approach to the Modeling of the Impact of Market Volatility on Investment
In recent years, authors have focused on modeling and forecasting volatility in financial series it is crucial for the characterization of markets, portfolio optimization and asset valuation. One of the most used methods to forecast market volatility is the linear regression. Nonetheless, the errors in prediction using this approach are often quite high. Hence, continued research is conducted t...
متن کاملA model with policy network approach for entrepreneurship policy making
One policy making issue that needs to be addressed more effectively through an intergovernmental and participatory approach is entrepreneurship policy. Entrepreneurship is an area where interdependencies are very high, and the establishment of collaborative relationships such as networks is vital. Therefore, a network approach in the entrepreneurial policy-making process, which leads to the inv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Simulation
دوره 82 شماره
صفحات -
تاریخ انتشار 2006