Performance Analysis of Scalable Attack Representation Models

Jin Bum Hong, Dong Seong Kim

Research output: Chapter in Book/Conference paperConference paper

14 Citations (Scopus)

Abstract

Attack graphs (AGs) have been widely used for security analysis. The construction of the graph-based attack models including the AG have been studied, but the security evaluation considering the full attack paths cannot be computed using existing attack models due to the scalability problem. To solve this, we propose to use hierarchical attack representation models (HARMs). First, we formulate key questions that need to be answered to compare the scalability of existing attack models. We show the scalability of the HARMs via simulations, by taking into account practical attack scenario based on various network topologies.
Original languageEnglish
Title of host publicationSecurity and Privacy Protection in Information Processing Systems. SEC 2013.
EditorsLech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi
Place of PublicationBerlin
PublisherSpringer
Pages330-343
Volume405
ISBN (Electronic)9783642392184
ISBN (Print)9783642392177
DOIs
Publication statusPublished - 2013
Externally publishedYes
EventConference on Risk Management Reloaded 2013 - Garching, Germany
Duration: 9 Sep 201313 Sep 2013

Publication series

NameIFIP Advances in Information and Communication Technology
PublisherSpringer
Volume405

Conference

ConferenceConference on Risk Management Reloaded 2013
CountryGermany
CityGarching
Period9/09/1313/09/13

Fingerprint

Scalability
Topology

Cite this

Hong, J. B., & Kim, D. S. (2013). Performance Analysis of Scalable Attack Representation Models. In L. J. Janczewski, H. B. Wolfe, & S. Shenoi (Eds.), Security and Privacy Protection in Information Processing Systems. SEC 2013. (Vol. 405, pp. 330-343). (IFIP Advances in Information and Communication Technology ; Vol. 405). Berlin: Springer. https://doi.org/10.1007/978-3-642-39218-4_25
Hong, Jin Bum ; Kim, Dong Seong. / Performance Analysis of Scalable Attack Representation Models. Security and Privacy Protection in Information Processing Systems. SEC 2013. . editor / Lech J. Janczewski ; Henry B. Wolfe ; Sujeet Shenoi. Vol. 405 Berlin : Springer, 2013. pp. 330-343 (IFIP Advances in Information and Communication Technology ).
@inproceedings{a3721e2921f5407ca999688df1909934,
title = "Performance Analysis of Scalable Attack Representation Models",
abstract = "Attack graphs (AGs) have been widely used for security analysis. The construction of the graph-based attack models including the AG have been studied, but the security evaluation considering the full attack paths cannot be computed using existing attack models due to the scalability problem. To solve this, we propose to use hierarchical attack representation models (HARMs). First, we formulate key questions that need to be answered to compare the scalability of existing attack models. We show the scalability of the HARMs via simulations, by taking into account practical attack scenario based on various network topologies.",
keywords = "Attack Graph, Attack Tree, Complexity Analysis, Security Model, Scalability",
author = "Hong, {Jin Bum} and Kim, {Dong Seong}",
year = "2013",
doi = "10.1007/978-3-642-39218-4_25",
language = "English",
isbn = "9783642392177",
volume = "405",
series = "IFIP Advances in Information and Communication Technology",
publisher = "Springer",
pages = "330--343",
editor = "Janczewski, {Lech J. } and Wolfe, {Henry B. } and Sujeet Shenoi",
booktitle = "Security and Privacy Protection in Information Processing Systems. SEC 2013.",
address = "Netherlands",

}

Hong, JB & Kim, DS 2013, Performance Analysis of Scalable Attack Representation Models. in LJ Janczewski, HB Wolfe & S Shenoi (eds), Security and Privacy Protection in Information Processing Systems. SEC 2013. . vol. 405, IFIP Advances in Information and Communication Technology , vol. 405, Springer, Berlin, pp. 330-343, Conference on Risk Management Reloaded 2013, Garching, Germany, 9/09/13. https://doi.org/10.1007/978-3-642-39218-4_25

Performance Analysis of Scalable Attack Representation Models. / Hong, Jin Bum; Kim, Dong Seong.

Security and Privacy Protection in Information Processing Systems. SEC 2013. . ed. / Lech J. Janczewski; Henry B. Wolfe; Sujeet Shenoi. Vol. 405 Berlin : Springer, 2013. p. 330-343 (IFIP Advances in Information and Communication Technology ; Vol. 405).

Research output: Chapter in Book/Conference paperConference paper

TY - GEN

T1 - Performance Analysis of Scalable Attack Representation Models

AU - Hong, Jin Bum

AU - Kim, Dong Seong

PY - 2013

Y1 - 2013

N2 - Attack graphs (AGs) have been widely used for security analysis. The construction of the graph-based attack models including the AG have been studied, but the security evaluation considering the full attack paths cannot be computed using existing attack models due to the scalability problem. To solve this, we propose to use hierarchical attack representation models (HARMs). First, we formulate key questions that need to be answered to compare the scalability of existing attack models. We show the scalability of the HARMs via simulations, by taking into account practical attack scenario based on various network topologies.

AB - Attack graphs (AGs) have been widely used for security analysis. The construction of the graph-based attack models including the AG have been studied, but the security evaluation considering the full attack paths cannot be computed using existing attack models due to the scalability problem. To solve this, we propose to use hierarchical attack representation models (HARMs). First, we formulate key questions that need to be answered to compare the scalability of existing attack models. We show the scalability of the HARMs via simulations, by taking into account practical attack scenario based on various network topologies.

KW - Attack Graph

KW - Attack Tree

KW - Complexity Analysis

KW - Security Model

KW - Scalability

U2 - 10.1007/978-3-642-39218-4_25

DO - 10.1007/978-3-642-39218-4_25

M3 - Conference paper

SN - 9783642392177

VL - 405

T3 - IFIP Advances in Information and Communication Technology

SP - 330

EP - 343

BT - Security and Privacy Protection in Information Processing Systems. SEC 2013.

A2 - Janczewski, Lech J.

A2 - Wolfe, Henry B.

A2 - Shenoi, Sujeet

PB - Springer

CY - Berlin

ER -

Hong JB, Kim DS. Performance Analysis of Scalable Attack Representation Models. In Janczewski LJ, Wolfe HB, Shenoi S, editors, Security and Privacy Protection in Information Processing Systems. SEC 2013. . Vol. 405. Berlin: Springer. 2013. p. 330-343. (IFIP Advances in Information and Communication Technology ). https://doi.org/10.1007/978-3-642-39218-4_25