Use of Attack Graphs in Security Systems

Vivek Shandilya, Chris B. Simmons, Sajjan Shiva
2014 Journal of Computer Networks and Communications  
Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified
more » ... n of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.
doi:10.1155/2014/818957 fatcat:3tumnhfkefel3izxtzbhm2izeu