Skip to main content

Automatic Construction and Optimization of Layered Network Attack Graph

  • Conference paper
  • First Online:
Novel Algorithms and Techniques in Telecommunications and Networking
  • 1386 Accesses

Abstract

For solving scalability problem of Network Attack Graph(NAG), this paper presents a new method for network modeling based on layered NAG. Layered NAG includes “attack subgraph” and “attack supergraph”. The attack subgraph describes specific attack scenarios from the source host to the destination host and efficiently produces the attack planning after eliminating redundant paths and nodes. The attack supergraph describes the attacker’s privilege transition to allow the network administrator to evaluate the vulnerabilities of the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. P. Ammann, J. Pamula, and R.Ritchey, “A Host– Based Approach to Network Attack Chaining Analysis”, Proceedings of the 21st Annual Computer Security Applications Conference 2005.

    Google Scholar 

  2. R. Ritchey, B. O’Berry, and S. Noel, “Representing TCP/IP Connectivity for Topological Analysis of Network Security”, Proceedings of the 18th Annual Computer Security Applications Conference, 2002, pp. 25-31.

    Google Scholar 

  3. O. Sheyner, “Scenario graphs and attack graphs”, PhD Thesis, School of Computer Science Carnegie Mellon University, 2004.

    Google Scholar 

  4. L. Swiler, C. Phillips, D. Ellis, and S. Chakerian, “Computer-attack graph generation tool”, Proceedings of DARPA Information Survivability Conference & Exposition II, June 2001, pp. 307-321.

    Google Scholar 

  5. P. Ammann, D. Wijesekera, and S. Kaushik, “Scalable graph-based vulnerability analysis”, Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002, pp. 217-224.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yonggang Wang , Nike Gui , Jianbin Hu or Zhong Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this paper

Cite this paper

Wang, Y., Gui, N., Hu, J., Chen, Z. (2010). Automatic Construction and Optimization of Layered Network Attack Graph. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_22

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-3662-9_22

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-3661-2

  • Online ISBN: 978-90-481-3662-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics