Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by: Anoop Singhal (Fed)

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 51 - 68 of 68

Investigating the Application of Moving Target Defenses to Network Security

August 15, 2013
Author(s)
Rui Zhuang, Su Zhang, Alex Bardas, Scott DeLoach, Xinming Ou, Anoop Singhal
This paper presents a preliminary design for a moving-target defense (MTD) for computer networks to combat an attacker's asymmetric advantage. The MTD system reasons over a set of abstract models that capture the network's configuration and its operational

An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities

July 31, 2013
Author(s)
M. Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang
Computer systems are vulnerable to both known and zero-day attacks. Although known attack patterns can be easily modeled, thus enabling the definition of suitable hardening strategies, handling zero-day vulnerabilities is inherently difficult due to their

VULCAN: Vulnerability Assessment Framework for Cloud Computing

June 20, 2013
Author(s)
Patrick Kamongi, Srujan Kotikela, Krishna Kavi, Mahadevan Gomathisankaran, Anoop Singhal
Assessing security of software services on Cloud is complex because the security depends on the vulnerability of infrastructure, platform and the software services. In many systems, the platform or the infrastructure on which the software will actually run

Mapping Evidence Graphs to Attack Graphs

January 17, 2013
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Attack graphs compute potential attack paths from a system configuration and known vulnerabilities of a system. Evidence graphs model intrusion evidence and dependencies among them for forensic analysis. In this paper, we show how to map evidence graphs to

Using Attack Graphs in Forensic Examinations

January 16, 2013
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system. Attack graphs can be used to eliminate known vulnerability sequences that can be eliminated to make attacks difficult and help

Security Ontologies for Modeling Enterprise Level Risk Assessment

December 7, 2012
Author(s)
Anoop Singhal, Samuel Singapogu
A unified formal knowledge model of information security domain is essential to support a risk management approach. IT Applications are increasingly exposed to a variety of information security threats. Often wrong decisions are made due to insufficient

Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics

October 11, 2012
Author(s)
Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal
A network security metric is desirable in evaluating the effectiveness of security solutions in distributed systems. Aggregating CVSS scores of individual vulnerabilities provides a practical approach to network security metric. However, existing

Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense

June 11, 2012
Author(s)
Rui Zhuang, Su Zhang, Scott DeLoach, Xinming Ou, Anoop Singhal
Moving-target defense has been hypothesized as a potential game changer in cyber defense, including that for computer networks. However there has been little work to study how much proactively changing a network's configuration can increase the difficulty

An Empirical Study of a Vulnerability Metric Aggregation Method

August 18, 2011
Author(s)
Su Zhang, Xinming Ou, Anoop Singhal, John Homer
Quantifying security risk is an important and yet difficult task in enterprise network risk management, critical for proactive mission assurance. Even though metrics exist for individual vulnerabilities, there is currently no standard way of aggregating

k-Zero Day Safety: Measuring the Security Risk of Networks Against Unknown Attacks

December 10, 2010
Author(s)
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the process of finding such flaws and developing exploits seems to be chaotic

Measuring Security Risk of Networks Using Attack Graphs

July 14, 2010
Author(s)
Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Jajodia
Today's computer systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of a network cannot be determined by simply counting the number of vulnerabilities. To accurately

Forensics Web Services

June 30, 2010
Author(s)
Anoop Singhal, Murat Gunestas, Duminda Wijesekera
Web services are currently a preferred way to architect and provide complex services. This complexity arises due to the composition of new services and dynamically invoking existing services. These compositions create service inter-dependencies that can be

Web Services Security: Techniques and Challenges (Extended Abstract)

July 21, 2008
Author(s)
Anoop Singhal
Web services-based computing is currently an important driver for the software industry. While several standards bodies (such as W3C and OASIS) are laying the foundation for Web services security, several research problems must be solved to make secure Web

An Attack Graph Based Probabilistic Security Metric

July 16, 2008
Author(s)
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia
To protect critical resources in today's networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities. This now becomes feasible due to a model of causal relationships between

A Relational Approach to the Interactive Analysis of Attack Graphs

April 2, 2008
Author(s)
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia
The analysis of attack graphs has played an important role in defending against network intrusions. This paper presents a relational approach. We devise a relational approach to model necessary inputs and network configurations to generate attack graphs.

Guide to Secure Web Services

August 29, 2007
Author(s)
Anoop Singhal, Theodore Winograd, Karen A. Scarfone
The advance of Web services technologies promises to have far-reaching effects on the Internet and enterprise networks. Web services based on the eXtensible Markup Language (XML), SOAP, and related open standards, and deployed in Service Oriented

Measuring the Overall Security of Network Configurations Using Attack Graphs

July 27, 2007
Author(s)
Lingyu Wang, Anoop Singhal, Sushil Jajodia
Today?s computer systems face sophisticated intrusions during which multiple vulnerabilities are combined for reaching an attack goal. To quantitatively assess the security of a network, one must first understand the interplay between vulnerabilities and