Back to Search Start Over

Efficient minimum-cost network hardening via exploit dependency graphs

Authors :
Brian C. O'Berry
Steven Noel
Sushil Jajodia
Michael A. Jacobs
Source :
ACSAC
Publication Year :
2004
Publisher :
IEEE, 2004.

Abstract

In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to compute attack paths (combinations of exploits), from which one can decide whether a given set of network hardening measures guarantees the safety of given critical resources. We go beyond attack paths to compute actual sets of hardening measures (assignments of initial network conditions) that guarantee the safety of given critical resources. Moreover, for given costs associated with individual hardening measures, we compute assignments that minimize overall cost. By doing our minimization at the level of initial conditions rather than exploits, we resolve hardening irrelevancies and redundancies in a way that cannot be done through previously proposed exploit-level approaches. Also, we use an efficient exploit-dependency representation based on monotonic logic that has polynomial complexity, as opposed to many previous attack graph representations having exponential complexity.

Details

Database :
OpenAIRE
Journal :
19th Annual Computer Security Applications Conference, 2003. Proceedings.
Accession number :
edsair.doi...........9c3856c06b30af369b40111ce226f12b