메뉴 건너뛰기




Volumn 26, Issue 5, 2007, Pages 349-360

Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities

Author keywords

Access control; Multiphase attack analysis; Network security; Safety problem; Vulnerability; Vulnerability analysis; Vulnerability Take Grant model

Indexed keywords

MULTIPHASE ATTACK ANALYSIS; SAFETY PROBLEM; VULNERABILITY ANALYSIS; VULNERABILITY TAKE GRANT (VTG);

EID: 34447521494     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2007.03.002     Document Type: Article
Times cited : (19)

References (36)
  • 1
    • 0038687692 scopus 로고    scopus 로고
    • Ammann P, Wijesekera D, Kaushik S. Scalable, graph-based network vulnerability analysis. In: Proceedings of nineth ACM conference on computer and communications security, Washington, DC; November 2002.
  • 2
    • 85012672561 scopus 로고    scopus 로고
    • Bishop M. Hierarchical take-grant protection systems. In: Proceedings of 8th symposium on operating systems principals; December 1981. p. 107-23.
  • 3
    • 34447523092 scopus 로고    scopus 로고
    • Bishop M. Practical Take-Grant systems: do they exist? Ph.D. thesis, Department of Computer Sciences, Purdue University, West Lafayette, IN 47097; May 1984.
  • 4
    • 0030376097 scopus 로고    scopus 로고
    • Conspiracy and information flow in the Take-Grant protection model
    • Bishop M. Conspiracy and information flow in the Take-Grant protection model. Journal of Computer Security 4 4 (1996) 331-360
    • (1996) Journal of Computer Security , vol.4 , Issue.4 , pp. 331-360
    • Bishop, M.1
  • 5
    • 0003487594 scopus 로고    scopus 로고
    • Technical report CSE-96-11, Department of Computer Science, University of California at Davis
    • Bishop M., and Bailey D. A critical analysis of vulnerability taxonomies. Technical report CSE-96-11 (September 1996), Department of Computer Science, University of California at Davis
    • (1996) A critical analysis of vulnerability taxonomies
    • Bishop, M.1    Bailey, D.2
  • 6
    • 34447501551 scopus 로고    scopus 로고
    • CERT Advisory CA-2000-02. Malicious HTML tags embedded in client web requests [online]. Available from: .
  • 7
    • 34447516728 scopus 로고    scopus 로고
    • Cheops-ng, the network swiss army knife [online]. Available from: .
  • 8
    • 2642519111 scopus 로고
    • Privilege graph: an extension to the typed access matrix model
    • Proceedings of third European symposium on research in computer security (ESORICS 94), (Brighton, UK) [Springer-Verlag]
    • Dacier M., and Deswarte Y. Privilege graph: an extension to the typed access matrix model. Proceedings of third European symposium on research in computer security (ESORICS 94), (Brighton, UK). Lecture Notes in Computer Science: Computer Security 875 (1994) 319-334 [Springer-Verlag]
    • (1994) Lecture Notes in Computer Science: Computer Security , vol.875 , pp. 319-334
    • Dacier, M.1    Deswarte, Y.2
  • 10
    • 33646187475 scopus 로고    scopus 로고
    • Technical Report, Department of Computer Science, University of California at Davis
    • Frank J., and Bishop M. Extending the Take-Grant protection system. Technical Report (1996), Department of Computer Science, University of California at Davis
    • (1996) Extending the Take-Grant protection system
    • Frank, J.1    Bishop, M.2
  • 11
    • 15744370034 scopus 로고    scopus 로고
    • A taxonomy of network and computer attacks
    • Hansman S., and Hunt R. A taxonomy of network and computer attacks. Journal of Computer Security 24 1 (2005) 31-43
    • (2005) Journal of Computer Security , vol.24 , Issue.1 , pp. 31-43
    • Hansman, S.1    Hunt, R.2
  • 12
    • 34447540935 scopus 로고    scopus 로고
    • Internet Security Systems. System Scanner information [online]. Available from: .
  • 13
    • 3042626763 scopus 로고    scopus 로고
    • Isamil O, Etoh M, Kadobayashi Y. A proposal and implementation of automatic detection/collection system for cross-site scripting vulnerability. In: Proceedings of the 18th international conference on advanced information networking and application (AINA'04); 2004.
  • 14
    • 84882574666 scopus 로고    scopus 로고
    • Jones A, Lipton R, Snyder L. A linear time algorithm for deciding security. In: Proceedings of 17th annual symposium on the foundations of computer science; October 1976. p. 33-41.
  • 15
    • 33646744335 scopus 로고
    • Protection mechanism models: their usefulness
    • Academic Press, New York City, NY p. 237-54
    • Jones A. Protection mechanism models: their usefulness. Foundations of secure computing (1978), Academic Press, New York City, NY p. 237-54
    • (1978) Foundations of secure computing
    • Jones, A.1
  • 16
    • 84948760464 scopus 로고    scopus 로고
    • Jha S, Sheyner O, Wing J. Two formal analyses of attack graphs. In: Proceedings of 15th IEEE computer security foundations workshop, Nova Scotia, Canada; June 2002.
  • 17
    • 20444498659 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • Kumar V., Srivastava J., and Lazarevic A. (Eds), Kluwer Academic Publisher
    • Jajodia S., Noel S., and O'Berry B. Topological analysis of network attack vulnerability. In: Kumar V., Srivastava J., and Lazarevic A. (Eds). Managing cyber threats: issues, approaches and challenges (2003), Kluwer Academic Publisher
    • (2003) Managing cyber threats: issues, approaches and challenges
    • Jajodia, S.1    Noel, S.2    O'Berry, B.3
  • 18
    • 34447507421 scopus 로고    scopus 로고
    • Mitre Corporation. Common vulnerabilities and exposure database [online]. Available from: .
  • 19
    • 84944727025 scopus 로고    scopus 로고
    • Noel S, Jajodia S, O'Berry B, Jacobs M. Efficient minimum-cost network hardening via exploit dependency graphs. In: Proceedings of the 19th annual computer security applications conference, Las Vegas, Nevada; December 2003.
  • 20
    • 20444480299 scopus 로고    scopus 로고
    • Noel S, Jajodia S. Managing attack graph complexity through visual hierarchical aggregation. In: Proceedings of the ACM CCS workshop on visualization and data mining for computer security, Fairfax, Virginia; October 2004.
  • 21
    • 21644481812 scopus 로고    scopus 로고
    • Noel S, Robertson E, Jajodia S. Correlating intrusion events and building attack scenarios through attack graph distances. In: Proceedings of the 20th annual computer security applications conference, Tucson, Arizona; December 2004.
  • 22
    • 85076884574 scopus 로고    scopus 로고
    • Ou X, Govindavajhala S, Appel AW. MulVal: a logic-based network security analyzer. In: Proceedings of 14th USENIX Security Symposium; 2005. p. 113-28.
  • 23
    • 0033718255 scopus 로고    scopus 로고
    • Ritchey RW, Ammann P. Using model checking to analyze network vulnerabilities. In: Proceedings of IEEE symposium on security and privacy; May 2001. p. 156-65.
  • 25
    • 0036093547 scopus 로고    scopus 로고
    • Model-based analysis of configuration vulnerabilities
    • Ramakrishnan C.R., and Sekar R. Model-based analysis of configuration vulnerabilities. Journal of Computer Security 10 1/2 (2002) 189-209
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 189-209
    • Ramakrishnan, C.R.1    Sekar, R.2
  • 26
    • 34447514983 scopus 로고    scopus 로고
    • Rohrmair G, Lowe G. Using data-independence in the analysis of intrusion detection systems. In: Workshop on issues in the theory of security (WITS'03), Warsaw, Poland; April 2003.
  • 27
    • 84893640965 scopus 로고    scopus 로고
    • Snyder L. On the synthesis and analysis of protection systems. In: Proceedings of sixth symposium on operating systems principals; November 1977. p. 141-50.
  • 28
    • 84964504906 scopus 로고    scopus 로고
    • Swiler L, Phillips C, Ellis D, Chakerian S. Computer attack graph generation tool. In: Proceedings of DARPA information survivability conference & exposition II; June 2001.
  • 29
    • 0036083194 scopus 로고    scopus 로고
    • Sheyner O, Haines J, Jha S, Lippmann R, Wing J. Automated generation and analysis of attack graphs. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA; 2002.
  • 31
    • 34447545226 scopus 로고    scopus 로고
    • SANS Research Center. The SANS top 20 Internet security vulnerabilities [online]. Available from: .
  • 32
    • 20844454559 scopus 로고    scopus 로고
    • Shahriari HR, Jalili R. Using CSP to model and analyze transmission control vulnerabilities within the broadcast network. In: Proceedings of the IEEE international networking and communication conference (INCC'2004); June 2004, p. 42-7.
  • 33
    • 34447524621 scopus 로고    scopus 로고
    • Shahriari HR, Jalili R. Modeling and analyzing network vulnerabilities via a logic-based approach. In: Proceedings of second international symposium of telecommunications (IST 2005), September 10-12; 2005, p. 13-8.
  • 34
    • 0019709101 scopus 로고    scopus 로고
    • Wu M. Hierarchical protection systems. In: Proceedings of 1981 symposium on security and privacy; April 1981. p. 113-23.
  • 36
    • 85084161252 scopus 로고    scopus 로고
    • Zerkle D, Levitt K. NetKuang - a multi-host configuration vulnerability checker. In: Proceedings of the sixth USENIX UNIX security symposium, San Jose, CA; 1996.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.