IRUS Total

Naggen: a Network Attack Graph GENeration tool

File Description SizeFormat 
CNS17-Naggen-poster.pdfSupporting information2.8 MBAdobe PDFView/Open
Barrere-CNS17-Naggen.pdfAccepted version4.57 MBAdobe PDFView/Open
Title: Naggen: a Network Attack Graph GENeration tool
Authors: Barrere, M
Lupu, EC
Item Type: Conference Paper
Abstract: Attack graphs constitute a powerful security tool aimed at modelling the many ways in which an attacker may compromise different assets in a network. Despite their usefulness in several security-related activities (e.g. hardening, monitoring, forensics), the complexity of these graphs can massively grow as the network becomes denser and larger, thus defying their practical usability. In this presentation, we first describe some of the problems that currently challenge the practical use of attack graphs. We then explain our approach based on core attack graphs, a novel perspective to address attack graph complexity. Finally, we present Naggen, a tool for generating, visualising and exploring core attack graphs. We use Naggen to show the advantages of our approach on different security applications.
Issue Date: 21-Dec-2017
Date of Acceptance: 13-Aug-2017
URI: http://hdl.handle.net/10044/1/54286
DOI: 10.1109/CNS.2017.8228667
ISBN: 9781538606834
Publisher: IEEE
Start Page: 378
End Page: 379
Journal / Book Title: 2017 IEEE Conference on Communications and Network Security (CNS)
Replaces: 10044/1/62799
Copyright Statement: © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Sponsor/Funder: Engineering & Physical Science Research Council (EPSRC)
Funder's Grant Number: EP/L022729/1
Conference Name: 2017 IEEE Conference on Communications and Network Security, CNS 2017
Keywords: Science & Technology
Computer Science, Theory & Methods
Engineering, Electrical & Electronic
Computer Science
network security
attack graphs
core attack graphs
attack graph visualisation
digital forensics
computer security
Core graphs
Core attack graphs
Attack Graphs
Network security
Network Attack Graph Generator
Publication Status: Published
Start Date: 2017-10-09
Finish Date: 2017-10-11
Conference Place: Las Vegas, USA
Online Publication Date: 2017-12-21
Appears in Collections:Computing
Faculty of Engineering