ious ways for ranking the partial solutions and evalu-
ating the solution on diverse network scenarios.
REFERENCES
Ammann, P., Wijesekera, D., and Kaushik, S. (2002).
Scalable, graph-based network vulnerability analy-
sis. In Proceedings of the 9th ACM Conference on
Computer and Communications Security (CCS 2002),
pages 217–224, Washington, DC, USA.
Balzarotti, D., Monga, M., and Sicari, S. (2005). Assessing
the risk of using vulnerable components. In Proceed-
ings of the 1st ACM Workshop on Quality of Protec-
tion (QoP 2005), volume 23 of Advances in Informa-
tion Security, pages 65–77. Springer.
Dacier, M. (1994). Towards quantitative evaluation of com-
puter security. PhD thesis, Institut National Polytech-
nique de Toulouse.
Greenberg, A. (2012). Shopping for zero-days: A price list
for hackers’ secret software exploits. Forbes.
Homer, J., Ou, X., and Schmidt, D. (2009). A sound and
practical approach to quantifying security risk in en-
terprise networks. Technical report, Kansas State Uni-
versity.
Ingols, K., Chu, M., Lippmann, R., Webster, S., and Boyer,
S. (2009). Modeling modern network attacks and
countermeasures using attack graphs. In Proceedings
of the Annual Computer Security Applications Con-
ference (ACSAC 2009), pages 117–126, Honolulu, HI,
USA.
Leversage, D. J. and Byres, E. J. (2008). Estimating a sys-
tem’s mean time-to-compromise. IEEE Security &
Privacy, 6(1):52–60.
McHugh, J. (2006). Quality of protection: Measuring the
unmeasurable? In Proceedings of the 2nd ACM Work-
shop on Quality of Protection (QoP 2006), pages 1–2,
Alexandria, VA, USA. ACM.
McQueen, M. A., McQueen, T. A., Boyer, W. F., and Chaf-
fin, M. R. (2009). Empirical estimates and observa-
tions of 0day vulnerabilities. In Proceedings of the
42nd Hawaii International Conference on System Sci-
ences (HICSS 2009), Waikoloa, Big Island, HI, USA.
Mehta, V., Bartzis, C., Zhu, H., Clarke, E., and Wing, J.
(2006). Ranking attack graphs. In Proceedings of
the 9th International Symposium On Recent Advances
In Intrusion Detection (RAID 2006), volume 4219 of
Lecture Notes in Computer Science, pages 127–144,
Hamburg, Germany.
Mell, P., Scarfone, K., and Romanosky, S. (2006). Com-
mon vulnerability scoring system. IEEE Security &
Privacy, 4(6):85–89.
Noel, S. and Jajodia, S. (2004). Managing attack graph
complexity through visual hierarchical aggregation.
In Proceedings of the ACM CCS Workshop on Vi-
sualization and Data Mining for Computer Security
(VizSEC/DMSEC 2004), pages 109–118, Fairfax, VA,
USA. ACM.
Pamula, J., Jajodia, S., Ammann, P., and Swarup, V. (2006).
A weakest-adversary security metric for network con-
figuration security analysis. In Proceedings of the 2nd
ACM Workshop on Quality of Protection (QoP 2006),
volume 23 of Advances in Information Security, pages
31–68, Alexandria, VA, USA. Springer.
Phillips, C. and Swiler, L. P. (1998). A graph-based system
for network-vulnerability analysis. In Proceedings of
the New Security Paradigms Workshop (NSPW 1998),
pages 71–79, Charlottesville, VA, USA.
Shahzad, M., Shafiq, M. Z., and Liu, A. X. (2012). A
large scale exploratory analysis of software vulnera-
bility life cycles. In Proceedings of the 34th Inter-
national Conference on Software Engineering (ICSE
2012), pages 771–781, Zurich, Switzerland.
Sheyner, O., Haines, J., Jha, S., Lippmann, R., and Wing,
J. M. (2002). Automated generation and analysis of
attack graphs. In Proceedings of the 2002 IEEE Sym-
posium on Security and Privacy (S&P 2002), pages
273–284, Berkeley, CA, USA.
The MITRE Corporation (2011). Common Weakness Scor-
ing System (CWSS
TM
). http://cwe.mitre.org/cwss/.
Version 0.8.
Wang, L., Islam, T., Long, T., Singhal, A., and Jajodia, S.
(2008). An attack graph-based probabilistic security
metric. In Atluri, V., editor, Proceedings of the 22nd
Annual IFIP WG 11.3 Working Conference on Data
and Applications Security, volume 5094 of Lecture
Notes in Computer Science, pages 283–296, London,
United Kingdom. Springer.
Wang, L., Jajodia, S., Singhal, A., and Noel, S. (2010). k-
zero day safety: Measuring the security risk of net-
works against unknown attacks. In Gritzalis, D.,
Preneel, B., and Theoharidou, M., editors, Proceed-
ings of the 15th European Symposium on Research in
Computer Security (ESORICS 2011), volume 6345 of
Lecture Notes in Computer Science, pages 573–587,
Athens, Greece. Springer.
SECRYPT2013-InternationalConferenceonSecurityandCryptography
218