Automated Generation and Analysis of Attack Graphs
Author:Oleg Sheyner, Joshua Haines, Somesh Jha, Richard Lippmann, and Jeannette M. Wing
Click here for the
PostScript
of the full conference paper.
Abstract
An integral part of modeling the global view of network security is
constructing attack graphs. In practice, attack graphs are
produced manually by Red Teams. Construction by hand, however, is
tedious, error-prone, and impractical for attack graphs larger than a
hundred nodes. In this paper we present an automated technique for
generating and analyzing attack graphs. We base our technique on
symbolic model checking algorithms,
letting us construct attack graphs automatically and efficiently. We
also describe two kinds of analysis on attack graphs for helping
analysts decide which attacks would be most cost-effective to guard
against. We implemented our technique in a tool suite and tested it
on a small network example, which includes models of a firewall and
intrusion detection system.