Abstract
Attack Graphs (AGs) are a well-known formalism and there are tools available for AG generation and security risk analysis. The security posture of a networked system can be evaluated via an AG. However, as the size of the system becomes large, the AG suffers from the state-space explosion problem. Scalable security models have been developed to cope with this issue. Hierarchical Attack Representation Models (HARMs) is one of the scalable security models, the core idea of HARM is to separate the system representation into two layers; an upper layer (reachability) and a lower layer (vulnerability). In this paper, we propose a novel security modeling and analysis framework named Safelite that (i) automatically converts an AG into a HARM and (ii) visualizes the HARMs with relevant security information, respectively. We present the design and implementation of Safelite using example networks.
Original language | English |
---|---|
Title of host publication | Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015 |
Place of Publication | United States |
Publisher | IEEE, Institute of Electrical and Electronics Engineers |
Pages | 1689-1696 |
Number of pages | 8 |
Volume | 2015 |
ISBN (Electronic) | 9781509001545 |
DOIs | |
Publication status | Published - 22 Dec 2015 |
Externally published | Yes |
Event | 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015 - Liverpool, United Kingdom Duration: 26 Oct 2015 → 28 Oct 2015 |
Conference
Conference | 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015 |
---|---|
Country/Territory | United Kingdom |
City | Liverpool |
Period | 26/10/15 → 28/10/15 |