메뉴 건너뛰기




Volumn , Issue , 2008, Pages 63-73

Extending logical attack graphs for efficient vulnerability analysis

Author keywords

Attack graphs; Incremental analysis; Logic programming

Indexed keywords

ATTACK GRAPH; ATTACK GRAPHS; ENTERPRISE NETWORKS; INCREMENTAL ALGORITHM; INCREMENTAL ANALYSIS; LOGICAL CHARACTERIZATION; MULTI-STAGE; NETWORK ADMINISTRATOR; OPERATING SYSTEMS; PARAMETER CHANGES; REAL NETWORKS; SECURITY POLICY; VULNERABILITY ANALYSIS;

EID: 67349085826     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455780     Document Type: Conference Paper
Times cited : (41)

References (39)
  • 1
    • 70349281206 scopus 로고    scopus 로고
    • www.physorg.com/newsl24982803.html.
  • 2
    • 70349278162 scopus 로고    scopus 로고
    • www.skyboxsecurity.com.
  • 3
    • 0036039865 scopus 로고    scopus 로고
    • Adaptive functional programming
    • New York, NY, USA, ACM Press
    • U. A. Acar, G. E. Blelloch, and R. Harper. Adaptive functional programming. In ACMPOPL, volume 37, pages 247-259, New York, NY, USA, 2002. ACM Press.
    • (2002) ACMPOPL , vol.37 , pp. 247-259
    • Acar, U.A.1    Blelloch, G.E.2    Harper, R.3
  • 4
    • 33845953872 scopus 로고    scopus 로고
    • The National Security Agency
    • TM.
    • TM
  • 5
    • 0038687692 scopus 로고    scopus 로고
    • Scalable, graph-based network vulnerability analysis
    • New York, NY, USA, ACM Press
    • Paul Ammann, Duminda Wijesekera, and Saket Kaushik. Scalable, graph-based network vulnerability analysis. In CCS '02, pages 217-224, New York, NY, USA, 2002. ACM Press.
    • (2002) CCS '02 , pp. 217-224
    • Ammann, P.1    Wijesekera, D.2    Kaushik, S.3
  • 7
    • 34547365455 scopus 로고    scopus 로고
    • A Windows access control demystified
    • Tech. rep, princeton university
    • Sudhakar Govindavajhala and Andrew Appel. A Windows access control demystified. Tech. rep., princeton university, 2006.
    • (2006)
    • Govindavajhala, S.1    Appel, A.2
  • 10
    • 34047168454 scopus 로고    scopus 로고
    • An annotated review of past papers on attack graphs
    • Technical report, MIT Lincoln Laboratory, USA, March
    • R. Lippmann and K. Ingols. An annotated review of past papers on attack graphs. Technical report, MIT Lincoln Laboratory, USA, March 2005.
    • (2005)
    • Lippmann, R.1    Ingols, K.2
  • 13
    • 33749520206 scopus 로고    scopus 로고
    • Multiple coordinated views for network attack graphs
    • Steven Noel, Michael Jacobs, Pramod Kalapa, and Sushil Jajodia. Multiple coordinated views for network attack graphs. In VizSEC, page 12, 2005.
    • (2005) VizSEC , pp. 12
    • Noel, S.1    Jacobs, M.2    Kalapa, P.3    Jajodia, S.4
  • 14
    • 20444480299 scopus 로고    scopus 로고
    • Managing attack graph complexity through visual hierarchical aggregation
    • Steven Noel and Sushil Jajodia. Managing attack graph complexity through visual hierarchical aggregation. In VizSEC, pages 109-118, 2004.
    • (2004) VizSEC , pp. 109-118
    • Noel, S.1    Jajodia, S.2
  • 15
    • 33846293304 scopus 로고    scopus 로고
    • Understanding complex network attack graphs through clustered adjacency matrices
    • Steven Noel and Sushil Jajodia. Understanding complex network attack graphs through clustered adjacency matrices. In ACSAC, pages 160-169, 2005.
    • (2005) ACSAC , pp. 160-169
    • Noel, S.1    Jajodia, S.2
  • 16
    • 85076884574 scopus 로고    scopus 로고
    • MulVAL: A logic-based network security analyzer
    • Society for Industrial and Applied Mathematics
    • X. Ou, S. Govindavajhala, and A. W. Appel. MulVAL: A logic-based network security analyzer. In 14th USENIX Security Symposium. Society for Industrial and Applied Mathematics, 2005.
    • (2005) 14th USENIX Security Symposium
    • Ou, X.1    Govindavajhala, S.2    Appel, A.W.3
  • 17
    • 70349267300 scopus 로고    scopus 로고
    • A Logic-Programming Approach to Network Security Analysis. PhD thesis, Department of Computer Science, Princeton University, USA, November
    • Xinming Ou. A Logic-Programming Approach to Network Security Analysis. PhD thesis, Department of Computer Science, Princeton University, USA, November 2005.
    • (2005)
    • Xinming, O.1
  • 18
    • 34547239511 scopus 로고    scopus 로고
    • A scalable approach to attack graph generation
    • New York, NY, USA, ACM Press
    • Xinming Ou, Wayne F. Boyer, and Miles A. McQueen. A scalable approach to attack graph generation. In CCS '06, pages 336-345, New York, NY, USA, 2006. ACM Press.
    • (2006) CCS '06 , pp. 336-345
    • Ou, X.1    Boyer, W.F.2    McQueen, M.A.3
  • 20
    • 84976843894 scopus 로고
    • Finite differencing of computable expressions
    • R. Paige and S. Koenig. Finite differencing of computable expressions. TOPLAS, 4(3):402-454, 1982.
    • (1982) TOPLAS , vol.4 , Issue.3 , pp. 402-454
    • Paige, R.1    Koenig, S.2
  • 22
    • 0036093547 scopus 로고    scopus 로고
    • Model-based analysis of configuration vulnerabilities
    • C. R. Ramakrishnan and R. Sekar. Model-based analysis of configuration vulnerabilities. Journal of Computer Security (JCS), 10(1 / 2): 189-209, 2002.
    • (2002) Journal of Computer Security (JCS) , vol.10 , Issue.1 2 , pp. 189-209
    • Ramakrishnan, C.R.1    Sekar, R.2
  • 23
    • 84976827167 scopus 로고
    • Incremental context-dependent analysis for language-based editors
    • T. Reps, T. Teitelbaum, and A. Demers. Incremental context-dependent analysis for language-based editors. ACM Trans. Program. Lang. Syst, 5(3):449-477, 1983.
    • (1983) ACM Trans. Program. Lang. Syst , vol.5 , Issue.3 , pp. 449-477
    • Reps, T.1    Teitelbaum, T.2    Demers, A.3
  • 24
    • 0028446160 scopus 로고
    • XSB as an efficient deductive database engine
    • ACM
    • K. Sagonas, Terrace Swift, and D. S. Warren. XSB as an efficient deductive database engine. In ACM SIGMOD, pages 442-453. ACM, 1994.
    • (1994) ACM SIGMOD , pp. 442-453
    • Sagonas, K.1    Swift, T.2    Warren, D.S.3
  • 25
    • 0348155876 scopus 로고    scopus 로고
    • Incremental evaluation of tabled logic programs
    • International Conference on Logic Programming, of
    • D. Saha and C. R. Ramakrishnan. Incremental evaluation of tabled logic programs. In International Conference on Logic Programming, volume 2916 of LNCS, pages 389-406, 2003.
    • (2003) LNCS , vol.2916 , pp. 389-406
    • Saha, D.1    Ramakrishnan, C.R.2
  • 27
    • 33745468608 scopus 로고    scopus 로고
    • Incremental evaluation of tabled prolog: Beyond pure logic programs
    • Practical Aspects of Declarative Languages, of, Charleston, South Carolina, Jan
    • D. Saha and C. R. Ramakrishnan. Incremental evaluation of tabled prolog: Beyond pure logic programs. In Practical Aspects of Declarative Languages, volume 3819 of LNCS, pages 215-229, Charleston, South Carolina, Jan 2006.
    • (2006) LNCS , vol.3819 , pp. 215-229
    • Saha, D.1    Ramakrishnan, C.R.2
  • 31
    • 84947984355 scopus 로고
    • Incremental model checking in the modal mu-calculus
    • In CAV, of
    • O. V. Sokolsky and S. A. Smolka. Incremental model checking in the modal mu-calculus. In CAV, volume 818 of LNCS, pages 351-363, 1994.
    • (1994) LNCS , vol.818 , pp. 351-363
    • Sokolsky, O.V.1    Smolka, S.A.2
  • 32
    • 70349265746 scopus 로고    scopus 로고
    • Rule-based topological vulnerability analysis
    • Vipin Swamp, Sushil Jajodia, and Joseph Pamula. Rule-based topological vulnerability analysis. In MMM-ACNS, pages 23-37, 2005.
    • (2005) MMM-ACNS , pp. 23-37
    • Swamp, V.1    Jajodia, S.2    Pamula, J.3
  • 34
    • 70349270381 scopus 로고    scopus 로고
    • uDraw(Graph). Available at http://www.informatik.uni-bremen.de/ uDrawGraph/en/uDrawGraph/uDrawGraph.html.
    • uDraw(Graph). Available at http://www.informatik.uni-bremen.de/ uDrawGraph/en/uDrawGraph/uDrawGraph.html.
  • 36
    • 33747198726 scopus 로고    scopus 로고
    • Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
    • Lingyu Wang, Anyi Liu, and Sushil Jajodia. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communications, 29(15):2917-2933, 2006.
    • (2006) Computer Communications , vol.29 , Issue.15 , pp. 2917-2933
    • Wang, L.1    Liu, A.2    Jajodia, S.3
  • 37
    • 33750984193 scopus 로고    scopus 로고
    • Minimum-cost network hardening using attack graphs
    • Lingyu Wang, Steven Noel, and Sushil Jajodia. Minimum-cost network hardening using attack graphs. Comput. Commun., 29(18):3812-3824, 2006.
    • (2006) Comput. Commun , vol.29 , Issue.18 , pp. 3812-3824
    • Wang, L.1    Noel, S.2    Jajodia, S.3
  • 38
    • 33746743758 scopus 로고    scopus 로고
    • Interactive analysis of attack graphs using relational queries
    • Lingyu Wang, Chao Yao, Anoop Singhal, and Sushil Jajodia. Interactive analysis of attack graphs using relational queries. In DBSec, pages 119-132, 2006.
    • (2006) DBSec , pp. 119-132
    • Wang, L.1    Yao, C.2    Singhal, A.3    Jajodia, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.