Sciweavers

FMCO
2003
Springer

Tools for Generating and Analyzing Attack Graphs

14 years 5 months ago
Tools for Generating and Analyzing Attack Graphs
Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulnerable their systems are and to determine what security measures to deploy to defend their systems. In this paper, we present details of an example to illustrate how we specify and analyze network attack models. We take these models as input to our attack graph tools to generate attack graphs automatically and to analyze system vulnerabilities. While we have published our generation and analysis algorithms in earlier work, the presentation of our example and toolkit is novel to this paper.
Oleg Sheyner, Jeannette M. Wing
Added 06 Jul 2010
Updated 06 Jul 2010
Type Conference
Year 2003
Where FMCO
Authors Oleg Sheyner, Jeannette M. Wing
Comments (0)