Show simple item record

dc.contributor.authorIngols, Kyle W.
dc.contributor.authorChu, Matthew D.
dc.contributor.authorLippmann, Richard P.
dc.contributor.authorWebster, Seth R.
dc.contributor.authorBoyer, Stephen
dc.date.accessioned2010-10-20T14:49:03Z
dc.date.available2010-10-20T14:49:03Z
dc.date.issued2010-02
dc.date.submitted2009-12
dc.identifier.isbn978-0-7695-3919-5
dc.identifier.issn1063-9527
dc.identifier.otherINSPEC Accession Number: 11072835
dc.identifier.urihttp://hdl.handle.net/1721.1/59422
dc.description.abstractBy accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements to the NetSPA attack graph system required to model additional present-day threats (zero-day exploits and client-side attacks) and countermeasures (intrusion prevention systems, proxy firewalls, personal firewalls, and host-based vulnerability scans). Point-to-point reachability algorithms and structures were extensively redesigned to support "reverse" reachability computations and personal firewalls. Host-based vulnerability scans are imported and analyzed. Analysis of an operational network with 84 hosts demonstrates that client-side attacks pose a serious threat. Experiments on larger simulated networks demonstrated that NetSPA's previous excellent scaling is maintained. Less than two minutes are required to completely analyze a four-enclave simulated network with more than 40,000 hosts protected by personal firewalls.en_US
dc.description.sponsorshipUnited States. Air Force (Contract FA8721-05-C-0002)en_US
dc.language.isoen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.relation.isversionofhttp://dx.doi.org/10.1109/ACSAC.2009.21en_US
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en_US
dc.sourceIEEEen_US
dc.subjectnetwork reachabilityen_US
dc.subjectnetwork defenseen_US
dc.subjectattack treeen_US
dc.subjectattack graphen_US
dc.subjectSCAPen_US
dc.titleModeling modern network attacks and countermeasures using attack graphsen_US
dc.typeArticleen_US
dc.identifier.citationIngols, K. et al. “Modeling Modern Network Attacks and Countermeasures Using Attack Graphs.” Computer Security Applications Conference, 2009. ACSAC '09. Annual. 2009. 117-126. ©2009 Institute of Electrical and Electronics Engineers.en_US
dc.contributor.departmentLincoln Laboratoryen_US
dc.contributor.approverIngols, Kyle W.
dc.contributor.mitauthorIngols, Kyle W.
dc.contributor.mitauthorChu, Matthew D.
dc.contributor.mitauthorLippmann, Richard P.
dc.contributor.mitauthorWebster, Seth R.
dc.contributor.mitauthorBoyer, Stephen
dc.relation.journalAnnual Computer Security Applications Conference, 2009. ACSAC '09en_US
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dspace.orderedauthorsIngols, Kyle; Chu, Matthew; Lippmann, Richard; Webster, Seth; Boyer, Stephenen
mit.licensePUBLISHER_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record