The Community for Technology Leaders
RSS Icon
Tucson, Arizona
Dec. 5, 2005 to Dec. 9, 2005
ISBN: 0-7695-2461-3
pp: 72-84
Paul Ammann , ISE Department George Mason University
Joseph Pamula , Center for Secure Information Systems George Mason University
Julie Street , ISE Department George Mason University
Ronald Ritchey , Booz Allen & Hamilton
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a chain is called an attack path, and the set of all possible attack paths form an attack graph. Researchers have proposed a variety of methods to generate attack graphs. In this paper, we provide a novel alternative approach to network vulnerability analysis by utilizing a penetration tester?s perspective of maximal level of penetration possible on a host. Our approach has the following benefits: it provides a more intuitive model in which an analyst can work, and its algorithmic complexity is polynomial in the size of the network, and so has the potential of scaling well to practical networks. The drawback is that we track only "good" attack paths, as opposed to all possible attack paths. Hence, an analyst may make suboptimal choices when repairing the network. Since attack graphs grow exponentially with the size of the network, we argue that suboptimal solutions are an unavoidable cost of scalability, and hence practical utility. A working prototype tool has been implemented to demonstrate the practicality of our approach.
Paul Ammann, Joseph Pamula, Julie Street, Ronald Ritchey, "A Host-Based Approach to Network Attack Chaining Analysis", ACSAC, 2005, Computer Security Applications Conference, Annual, Computer Security Applications Conference, Annual 2005, pp. 72-84, doi:10.1109/CSAC.2005.6
14 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool