NetSecuritas: An Integrated Attack Graph-Based Security Assessment Tool for Enterprise Networks
Sophisticated cyber-attacks have become prominent with the growth of the Internet and web technology. Such attacks are multi-stage ones, and correlate vulnerabilities on intermediate hosts to compromise an otherwise well-protected critical resource. Conventional security assessment approaches can leave out some complex scenarios generated by these attacks. In the literature, these correlated attacks have been modeled using attack graphs. Although a few attack graph-based network security assessment tools are available, they are either commercial products or developed using proprietary databases. In this paper, we develop a customized tool, NetSecuritas, which implements a novel heuristic-based attack graph generation algorithm and integrates different phases of network security assessment. NetSecuritas leverages open-source libraries, tools and publicly available databases. A cost-driven mitigation strategy has also been proposed to generate network security recommendations. Experimental results establish the efficacy of both attack graph generation and mitigation approach.
N. Ghosh et al., "NetSecuritas: An Integrated Attack Graph-Based Security Assessment Tool for Enterprise Networks," Proceedings of the 2015 International Conference on Distributed Computing and Networking (2015, Goa, India), Association for Computing Machinery (ACM), Jan 2015.
The definitive version is available at https://doi.org/10.1145/2684464.2684494
2015 International Conference on Distributed Computing and Networking, ICDCN '15 (2015: Jan. 4-7, Goa, India)
Keywords and Phrases
Complex networks; Computer crime; Distributed computer systems; Graphic methods; Attack graph; Attack graph generation algorithms; Commercial products; Mitigation strategy; Open-source libraries; Penetration testing; Security assessment; Vulnerability assessments; Network security
International Standard Book Number (ISBN)
Article - Conference proceedings
© 2015 Association for Computing Machinery (ACM), All rights reserved.
01 Jan 2015