We present the first steps towards an implementation of at- tack graph construction and analysis technique based on inference rules. In our model, XML credentials describe basic attacks to the system, then inference rules allow composition of new attacks. We aim at modifying previously developed algorithm for the analysis of transitive trust mod- els to the analysis of attack graphs. Important peculiarity of our model is exploitation of c-semirings for evaluation of system security level. C- semirings allow an application of the same algorithms for an analysis of attack graphs regardless of what metric is selected for the evaluation
Parametric Attack Graph Construction and Analysis
Leanid Krautsevich
2012
Abstract
We present the first steps towards an implementation of at- tack graph construction and analysis technique based on inference rules. In our model, XML credentials describe basic attacks to the system, then inference rules allow composition of new attacks. We aim at modifying previously developed algorithm for the analysis of transitive trust mod- els to the analysis of attack graphs. Important peculiarity of our model is exploitation of c-semirings for evaluation of system security level. C- semirings allow an application of the same algorithms for an analysis of attack graphs regardless of what metric is selected for the evaluationFile in questo prodotto:
Non ci sono file associati a questo prodotto.
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.