Authors:
Igor Kotenko
and
Mikhail Stepashkin
Affiliation:
St. Petersburg Institute for Informatics and Automation, Russian Federation
Keyword(s):
Network attacks, Vulnerability Assessment, Risk Assessment, Security Metrics.
Related
Ontology
Subjects/Areas/Topics:
Data and Systems Security
;
Information and Systems Security
;
Information Assurance
;
Intrusion Detection & Prevention
;
Management of Computing Security
;
Risk Assessment
;
Security in Information Systems
;
Security Metrics and Measurement
Abstract:
The approach to computer network security analysis intended for using both at design and exploitation stages is suggested. This approach is based on simulation of malefactor’s behavior, generating common attack graphs and calculating different security metrics. The graph represents possible attack scenarios taking into account network configuration, security policy, malefactor’s locations, knowledge level and strategy. The security metrics describe computer network security at different levels of detail and take into account various aspects of security. Attack scenarios model, common attack graph building procedures, used security metrics, and general security level evaluation are defined. The implemented version of the security analysis system is described, and examples of express-evaluations of security level are considered.