Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs

ACSAC '03: Proceedings of the 19th Annual Computer Security Applications Conference(2003)

引用 396|浏览303
暂无评分
摘要
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to compute attack paths (combinations of exploits), from which one can decide whether a given set of network hardening measures guarantees the safety of given critical resources. We go beyond attack paths to compute actual sets of hardening measures (assignments of initial network conditions) that guarantee the safety of given critical resources. Moreover, for given costs associated with individual hardening measures, we compute assignments that minimize overall cost. By doing our minimization at the level of initial conditions rather than exploits, we resolve hardening irrelevancies and redundancies in a way that cannot be done through previously proposed exploit-level approaches. Also, we use an efficient exploit-dependency representation based on monotonic logic that has polynomial complexity, as opposed to many previous attack graph representations having exponential complexity.
更多
查看译文
关键词
communication complexity,computer crime,graph theory,telecommunication security,attack paths computing,exploit dependency representation graphs,exponential complexity,minimum-cost network hardening measures,monotonic logic,network security vulnerability,polynomial complexity,
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要