modelling and security evaluation. We also
described the developed prototype of the AMSEC,
which can generate a possible attack tree for a
predefined network and a simple experiment was
considered.
The future steps of the research will be devoted
to detailed elaboration of all AMSEC components.
One of the important research issues is development
of techniques which can cope with large networks,
such as those in enterprise infrastructure.
Also it is planned to optimize the generation of
attack trees through the use of the ontology based
repository, to expand the list of parameters,
characterizing the hosts and the network, to improve
the malefactor model, and to add currently
unrealized components.
ACKNOWLEDGEMENTS
This research is being supported by grant of the
Russian Foundation of Basic Research (projects 10-
01-00826), the Program of fundamental research of
the Department for Nanotechnologies and
Informational Technologies of the Russian Academy
of Sciences, the State contract #11.519.11.4008 and
by the EU as part of the SecFutur and MASSIF
projects.
REFERENCES
CPE, 2012. Common Platform Enumeration, viewed 01
March 2012, <http://cpe.mitre.org/>.
CVE,2012. Common Vulnerabilities and Exposures.
viewed 01 March 2012, <http://cve.mitre.org/>.
CVSS,2012. Common Vulnerability Scoring System,
viewed 01 March 2012, <http://www.first.org/cvss/>.
Dawkins, J., Campbell, C., Hale. J., 2002. Modeling
network attacks: Extending the attack tree paradigm.
In Workshop on Statistical and Machine Learning
Techniques in Computer Intrusion Detection, Johns
Hopkins University.
Hariri, S., Qu, G., Dharmagadda, T., Ramkishore, M.,
Raghavendra C. S., 2003. Impact Analysis of Faults
and Attacks in Large-Scale Networks. In IEEE
Security and Privacy, vol.1 pp.49-54.
Huang, M.-Y., Wicks, T. M., 1998. A Large-scale
Distributed Intrusion Detection Framework Based on
Attack Strategy Analysis. In First International
Workshop on the Recent Advances in Intrusion
Detection, Raid’98, Louvain-la-Neuve, Belgium.
Ingols, K., Chu, M., Lippmann, R., Webster, S., Boyer, S.,
2009. Modeling modern network attacks and
countermeasures using attack graphs. In Proceedings
of the 2009 Annual Computer Security Applications
Conference (ACSAC ’09), Washington, D.C., USA,
IEEE Computer Society.
Kheir, N., Cuppens-Boulahia, N., Cuppens F. and Debar
H., 2010. A service dependency model for cost-
sensitive intrusion response. In Proceedings of the
15th European Symposium on Research in Computer
Security (ESORICS), Athens, Greece.
Kotenko, I., Stepashkin, M., 2006. Attack Graph based
Evaluation of Network Security. In Lecture Notes in
Computer Science, Vol. 4237, pp.216-227.
Kotenko, I., Stepashkin, M., Doynikova, E., 2011.
Security Analysis of Computer-aided Systems taking
into account Social Engineering Attacks In
Proceedings of the 19th Euromicro International
Conference on Parallel, Distributed and network-
based Processing (PDP 2011), Los Alamitos,
California. IEEE Computer Society, pp.611-618.
Lippmann, R., Ingols, K., 2006. Validating and Restoring
Defense in Depth Using Attack Graphs. In
Proceedings of MILCOM 2006. Washington, DC.
MSM, 2012. Making Security Measurable, viewed 01
March 2012, http://measurablesecurity.mitre.org/
index.html>.
MASSIF, 2012. Massif project, viewed 01 March 2012,
<http://www.massif-project.eu>
Miller, D. R., Harris, Sh., Harper, A. A., VanDyke, S.,
Black, Ch. 2011. Security Information and Event
Management (SIEM) Implementation. McGraw–Hill
Companies. 2011. 430 p.
Moore, A. P., Ellison, R. J., Linger, R. C., 2001. Attack
Modeling for Information Security and Survivability.
Technical Note CMU/SEI-2001-TN-001. Survivable
Systems.
Noel, S., Jajodia, S., O’Berry, B., Jacobs, M., 2003.
Efficient minimum-cost network hardening via exploit
dependency graphs. In Proceedings of the 19th Annual
Computer Security Applications Conference
(ACSAC’03).
NVD, 2012. National Vulnerability Database viewed 01
March 2012, <http://nvd.nist.gov/>
Wang, L., Islam, T., Long, T., Singhal, A., Jajodia, S.,
2008. An attack graph-based probabilistic security
metric. In Proceedings of the 22nd Annual IFIP WG
11.3 Working Conference on Data and Applications
Security (DBSec’08).
Wang, L., Jajodia, S., Singhal, A., Noel, S., 2010. k-Zero
Day Safety: Measuring the Security Risk of Networks
against Unknown Attacks. In ESORICS'10
Proceedings of the 15th European conference on
Research in computer security. Springer-Verlag,
Berlin, Heidelberg, pp.573-587.
Wang, L., Whitley, J. N., Phan, R. C. W., Parish, D. J.,
2011. Unified Parametrizable Attack Tree. In
International Journal for Information Security
Research, Vol.1 (1), pp. 20-26.
SECRYPT2012-InternationalConferenceonSecurityandCryptography
394