Today's information systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of an enterprise network cannot be determined by simply counting the number of vulnerabilities. To accurately assess the security of enterprise systems one must understand how vulnerabilities can be combined to stage an attack. We model such composition of vulnerabilities through probabilistic attack graphs, which show all paths of attacks that allow incremental network penetration. We propagate attack likelihoods through the attack graph, yielding a novel way to measure the security risk of enterprise systems. We use this metric for risk mitigation analysis to maximize the security of enterprise systems. We believe that our methodology based on probabilistic attack graphs can be used to evaluate and strengthen the overall security of enterprise networks.
Citation: NIST Interagency/Internal Report (NISTIR) - 7788Report Number:
NIST Pub Series: NIST Interagency/Internal Report (NISTIR)
Pub Type: NIST Pubs
attack detection, attack graphs, computer networks, security risk