Paper
8 March 2002 Combinatorial analysis of network security
Steven E. Noel, Brian O'Berry, Charles Hutchinson, Sushil Jajodia, Lynn M. Keuthan, Andy Nguyen
Author Affiliations +
Abstract
We extend the traditional analysis of network vulnerability by searching for sequences of exploited vulnerabilities distributed throughout a network. While vulnerabilities considered in isolation may seem innocuous, when considered in combination they may lead to serious security breaches. Our approach establishes encoding rules to reason about interdependent vulnerabilities and exploits. It then reasons about the rules to perform critical failure analysis for a given network. We have developed a prototype software tool for automating the analysis, which can be integrated with existing network security tools such as vulnerability databases and network discovery tools. We demonstrate our approach through an example application. We also perform a scaling experiment to show the performance of our approach for larger networks.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Steven E. Noel, Brian O'Berry, Charles Hutchinson, Sushil Jajodia, Lynn M. Keuthan, and Andy Nguyen "Combinatorial analysis of network security", Proc. SPIE 4738, Wavelet and Independent Component Analysis Applications IX, (8 March 2002); https://doi.org/10.1117/12.458763
Lens.org Logo
CITATIONS
Cited by 7 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Software development

Information security

Systems modeling

Logic

Computer programming

Databases

Back to Top