Use of attack graphs in security systems
Abstract
Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.
Publication Title
Journal of Computer Networks and Communications
Recommended Citation
Shandilya, V., Simmons, C., & Shiva, S. (2014). Use of attack graphs in security systems. Journal of Computer Networks and Communications, 2014 https://doi.org/10.1155/2014/818957