We present the first steps towards an implementation of at- tack graph construction and analysis technique based on inference rules. In our model, XML credentials describe basic attacks to the system, then inference rules allow composition of new attacks. We aim at modifying previously developed algorithm for the analysis of transitive trust mod- els to the analysis of attack graphs. Important peculiarity of our model is exploitation of c-semirings for evaluation of system security level. C- semirings allow an application of the same algorithms for an analysis of attack graphs regardless of what metric is selected for the evaluation

Parametric Attack Graph Construction and Analysis

Leanid Krautsevich
2012

Abstract

We present the first steps towards an implementation of at- tack graph construction and analysis technique based on inference rules. In our model, XML credentials describe basic attacks to the system, then inference rules allow composition of new attacks. We aim at modifying previously developed algorithm for the analysis of transitive trust mod- els to the analysis of attack graphs. Important peculiarity of our model is exploitation of c-semirings for evaluation of system security level. C- semirings allow an application of the same algorithms for an analysis of attack graphs regardless of what metric is selected for the evaluation
2012
Istituto di informatica e telematica - IIT
Attack Graph
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/128101
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact