Abstract
Attack Graphs (AGs) are a well-known formalism and there are tools available for AG generation and security risk analysis. The security posture of a networked system can be evaluated via an AG. However, as the size of the system becomes large, the AG suffers from the state-space explosion problem. Scalable security models have been developed to cope with this issue. Hierarchical Attack Representation Models (HARMs) is one of the scalable security models, the core idea of HARM is to separate the system representation into two layers; an upper layer (reachability) and a lower layer (vulnerability). In this paper, we propose a novel security modeling and analysis framework named Safelite that (i) automatically converts an AG into a HARM and (ii) visualizes the HARMs with relevant security information, respectively. We present the design and implementation of Safelite using example networks.
Original language | English |
---|---|
Title of host publication | Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015 |
Place of Publication | United States |
Publisher | IEEE, Institute of Electrical and Electronics Engineers |
Pages | 1689-1696 |
Number of pages | 8 |
Volume | 2015 |
ISBN (Electronic) | 9781509001545 |
DOIs | |
Publication status | Published - 22 Dec 2015 |
Externally published | Yes |
Event | 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015 - Liverpool, United Kingdom Duration: 26 Oct 2015 → 28 Oct 2015 |
Conference
Conference | 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015 |
---|---|
Country | United Kingdom |
City | Liverpool |
Period | 26/10/15 → 28/10/15 |
Fingerprint
Cite this
}
Towards automated generation and visualization of hierarchical attack representation models. / Jia, Fangcheng; Hong, Jin B.; Kim, Dong Seong.
Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015. Vol. 2015 United States : IEEE, Institute of Electrical and Electronics Engineers, 2015. p. 1689-1696 7363301.Research output: Chapter in Book/Conference paper › Conference paper
TY - GEN
T1 - Towards automated generation and visualization of hierarchical attack representation models
AU - Jia, Fangcheng
AU - Hong, Jin B.
AU - Kim, Dong Seong
PY - 2015/12/22
Y1 - 2015/12/22
N2 - Attack Graphs (AGs) are a well-known formalism and there are tools available for AG generation and security risk analysis. The security posture of a networked system can be evaluated via an AG. However, as the size of the system becomes large, the AG suffers from the state-space explosion problem. Scalable security models have been developed to cope with this issue. Hierarchical Attack Representation Models (HARMs) is one of the scalable security models, the core idea of HARM is to separate the system representation into two layers; an upper layer (reachability) and a lower layer (vulnerability). In this paper, we propose a novel security modeling and analysis framework named Safelite that (i) automatically converts an AG into a HARM and (ii) visualizes the HARMs with relevant security information, respectively. We present the design and implementation of Safelite using example networks.
AB - Attack Graphs (AGs) are a well-known formalism and there are tools available for AG generation and security risk analysis. The security posture of a networked system can be evaluated via an AG. However, as the size of the system becomes large, the AG suffers from the state-space explosion problem. Scalable security models have been developed to cope with this issue. Hierarchical Attack Representation Models (HARMs) is one of the scalable security models, the core idea of HARM is to separate the system representation into two layers; an upper layer (reachability) and a lower layer (vulnerability). In this paper, we propose a novel security modeling and analysis framework named Safelite that (i) automatically converts an AG into a HARM and (ii) visualizes the HARMs with relevant security information, respectively. We present the design and implementation of Safelite using example networks.
KW - Attack graphs
KW - Hierarchical attack representation models
KW - Security analysis
KW - Visualization
UR - http://www.scopus.com/inward/record.url?scp=84964294508&partnerID=8YFLogxK
U2 - 10.1109/CIT/IUCC/DASC/PICOM.2015.255
DO - 10.1109/CIT/IUCC/DASC/PICOM.2015.255
M3 - Conference paper
VL - 2015
SP - 1689
EP - 1696
BT - Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015
PB - IEEE, Institute of Electrical and Electronics Engineers
CY - United States
ER -