[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3368860.3368862acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
research-article
Public Access

Employing attack graphs for intrusion detection

Published: 15 January 2020 Publication History

Abstract

Intrusion detection systems are a commonly deployed defense that examines network traffic, host operations, or both to detect attacks. However, more attacks bypass IDS defenses each year, and with the sophistication of attacks increasing as well, we must examine new perspectives for intrusion detection. Current intrusion detection systems focus on known attacks and/or vulnerabilities, limiting their ability to identify new attacks, and lack the visibility into all system components necessary to confirm attacks accurately, particularly programs. To change the landscape of intrusion detection, we propose that future IDSs track how attacks evolve across system layers by adapting the concept of attack graphs. Attack graphs were proposed to study how multi-stage attacks could be launched by exploiting known vulnerabilities. Instead of constructing attacks reactively, we propose to apply attack graphs proactively to detect sequences of events that fulfill the requirements for vulnerability exploitation. Using this insight, we examine how to generate modular attack graphs automatically that relate adversary accessibility for each component, called its attack surface, to flaws that provide adversaries with permissions that create threats, called attack states, and exploit operations from those threats, called attack actions. We evaluate the proposed approach by applying it to two case studies: (1) attacks on file retrieval, such as TOCTTOU attacks, and (2) attacks propagated among processes, such as attacks on Shell-shock vulnerabilities. In these case studies, we demonstrate how to leverage existing tools to compute attack graphs automatically and assess the effectiveness of these tools for building complete attack graphs. While we identify some research areas, we also find several reasons why attack graphs can provide a valuable foundation for improving future intrusion detection systems.

References

[1]
Martin Abadi, Mihai Budiu, Ulfar Erlingsson, and Jay Ligatti. 2005. Control-Flow Integrity: Principles, Implementations and Applications. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005).
[2]
Massimiliano Albanese, Sushil Jajodia, and Steven Noel. 2012. Time-efficient and Cost-effective Network Hardening Using Attack Graphs. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 1--12.
[3]
Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, and Lingyu Wang. 2013. An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities. In Proceedings of the International Conference on Security and Cryptography. 322--340.
[4]
Paul Ammann, Duminda Wijesekera, and Saket Kaushik. 2002. Scalable, Graph-based Network Vulnerability Analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002). 217--224.
[5]
Azeem Aqil, Karim Khalil, Ahmed O.F. Atya, Evangelos E. Papalexakis, Srikanth V. Krishnamurthy, Trent Jaeger, K.K. Ramakrishnan, Paul Yu, and Ananthram Swami. 2017. Towards Network Intrusion Detection at ISP Scale. In Proceedings of the 13th International Conference on Emerging Networking Experiments and Technologies (CoNEXT).
[6]
Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, and David Brumley. 2011. Automatic Exploit Generation. In Proceedings of the 2011 Network and Distributed Systems Symposium.
[7]
Stefan Axelsson. 1999. The Base-rate Fallacy and Its Implications for the Difficulty of Intrusion Detection. In Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection.
[8]
Stefan Axelsson. 1999. The Base-rate Fallacy and Its Implications for the Difficulty of Intrusion Detection. In Proceedings of the 6th ACM Conference on Computer and Communications Security. 1--7.
[9]
Davide Balzarotti, Marco Cova, Vika Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna. 2008. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. In Proceedings of the 2008 IEEE Symposium on Security and Privacy. 387--401.
[10]
Subarno Banerjee, David Devecsery, Peter M Chen, and Satish Narayanasamy. 2019. Iodine: Fast Dynamic Taint Tracking Using Rollback-free Optimistic Hybrid Analysis. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 490--504.
[11]
Adam Bates, Dave (Jing) Tian, Kevin R.B. Butler, and Thomas Moyer. 2015. Trustworthy Whole-system Provenance for the Linux Kernel. In Proceedings of the 24th USENIX Security Symposium. 319--334.
[12]
Anaël Beaugnon, Pierre Chifflier, and Francis Bach. 2017. ILAB: An Interactive Labelling Strategy for Intrusion Detection. In Proceedings of the 20th International Symposium on Research in Attacks, Intrusions, and Defenses. 120--140.
[13]
Matt Bishop and Michael Digler. 1996. Checking for Race Conditions in File Accesses. Computer Systems 9, 2 (Spring 1996).
[14]
Ahmet Salih Buyukkayhan, Alina Oprea, Zhou Li, and William K. Robertson. 2017. Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis. In Proceedings of the 20th International Symposium on Research in Attacks, Intrusions, and Defenses.
[15]
Xiang Cai, Yuwei Gui, and Rob Johnson. 2009. Exploiting Unix File-System Races via Algorithmic Complexity Attacks. In Proceedings of the 30th IEEE Symposium on Security and Privacy.
[16]
Nicholas Carlini and David A. Wagner. 2016. Towards Evaluating the Robustness of Neural Networks. CoRR abs/1608.04644 (2016). arXiv:1608.04644 http://arxiv.org/abs/1608.04644
[17]
Haining Chen, Ninghui Li, William Enck, Yousra Aafer, and Xiangyu Zhang. 2017. Analysis of SEAndroid Policies: Combining MAC and DAC in Android. In Proceedings of the 33rd Annual Computer Security Applications Conference. 553--565.
[18]
Hong Chen, Ninghui Li, and Ziqing Mao. 2009. Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems. In Proceedings of the 2009 Network and Distributed Systems Symposium.
[19]
Daniel B. Cid. 2008. OSSEC. http://www.ossec.net/
[20]
Cisco. 2015. Vulnerability-Focused Threat Detection: Protect Against the Unknown. https://www.cisco.com/c/en/us/products/collateral/security/ips-4200-series-sensors/white_paper_c11-470178.html
[21]
CVSS 2019. Common Vulnerability Scoring System SIG. https://www.first.org/cvss/.
[22]
Marc Dacier and Yves Deswarte. 1994. Privilege Graph: An Extension to the Typed Access Matrix Model. In Proceedings of the 1994 European Symposium on Research in Computer Security, Dieter Gollmann (Ed.). 319--334.
[23]
Marc Dacier, Yves Deswarte, and Mohamed Kaâniche. 1996. Models and Tools for Quantitative Assessment of Operational Security. In Information Systems Security: Facing the Information Society of the 21st Century. Springer US, Boston, MA, 177--186.
[24]
Dorothy E. Denning. 1976. A Lattice Model of Secure Information Flow. Commun. ACM 19, 5 (1976), 236--242.
[25]
Gregory J. Duck, Roland H. C. Yap, and Lorenzo Cavallaro. 2017. Stack Bounds Protection with Low Fat Pointers. In Proceedings of the 2017 Network and Distributed Systems Symposium.
[26]
Nicolas Falliere, Liam O Murchu, and Eric Chien. 2011. Symantec Security Response, W32.Stuxnet Dossier, Version 1.4. (Feb. 2011).
[27]
Amer Farroukh, Mohammad Sadoghi, and Hans-Arno Jacobsen. 2011. Towards Vulnerability-based Intrusion Detection with Event Processing. In Proceedings of the 5th ACM International Conference on Distributed Event-based Systems. ACM, 171--182.
[28]
Ioannis Gasparis, Zhiyun Qian, Chengyu Song, and Srikanth V. Krishnamurthy. 2017. Detecting Android Root Exploits by Learning from Root Providers. In Proceedings of the 26th USENIX Security Symposium. 1129--1144.
[29]
Pierce Gibbs. 2017. Intrusion Detection Evasion Techniques and Case Studies. STI Graduate Student Research in SANS. https://www.sans.org/reading-room/whitepapers/detection/paper/37527
[30]
Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In Proceedings of the 3rd International Conference on Learning Representations (ICLR 2015).
[31]
Xueyuan Han, Thomas Pasquier, and Margo Seltzer. 2018. Provenance-based Intrusion Detection: Opportunities and Challenges. In Proceedings of the 10th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2018).
[32]
Norman Hardy. 1988. The Confused Deputy. Operating Systems Review 22, 4 (Oct. 1988), 36--38.
[33]
Michael Harrison, Walter Ruzzo, and Jeffrey D. Ullman. 1976. Protection in Operating Systems. Commun. ACM 19 (Aug. 1976). Issue 8.
[34]
Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, and Patrick McDaniel. 2010. A Logical Specification and Analysis for SELinux MLS Policy. ACM Transactions on Information and System Security (TISSEC) 13 (July 2010).
[35]
Hanan Hindy, David Brosset, Ethan Bayne, Amar Seeam, Christos Tachtatzis, Robert C. Atkinson, and Xavier J. A. Bellekens. 2018. A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets. CoRR abs/1806.03517 (2018).
[36]
Michael Howard, Jon Pincus, and Jeannette Wing. 2003. Measuring Relative Attack Surfaces. In Proceedings of Workshop on Advanced Developments in Software and Systems Security.
[37]
Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, and Zhenkai Liang. 2016. Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks. In Proceedings of the 2016 IEEE Symposium on Security and Privacy. 969--986.
[38]
Eric M Hutchins, Michael J Cloppert, and Rohan M Amin. 2011. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Leading Issues in Information Warfare & Security Research 1, 1 (2011), 80.
[39]
Kyriakos K. Ispoglou, Bader AlBassam, Trent Jaeger, and Mathias Payer. 2018. Block Oriented Programming: Automating Data-Only Attacks. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS 2018). 1868--1882.
[40]
Trent Jaeger, Reiner Sailer, and Xiaolan Zhang. 2003. Analyzing Integrity Protection in the SELinux Example Policy. In Proceedings of the 12th USENIX Security Symposium.
[41]
Sushil Jajodia, Steven Noel, and Brian O'Berry. 2005. Topological Analysis of Network Attack Vulnerability. Springer US, 247--266.
[42]
Amin Kharraz and Engin Kirda. 2017. Redemption: Real-Time Protection Against Ransomware at End-Hosts. In Proceedings of the 20th International Symposium on Research in Attacks, Intrusions, and Defenses.
[43]
Maxwell N. Krohn, Alexander Yip, Micah Brodsky, Natan Cliffer, Frans Kaashoek, Eddie Kohler, and Robert Morris. 2007. Information Flow Control for Standard OS Abstractions. In Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP 2007).
[44]
Kyu Hyung Lee, Xiangyu Zhang, and Dongyan Xu. 2013. High Accuracy Attack Provenance via Binary-based Execution Partition. In Proceedings of the 20th Network and Distributed System Security Symposium, NDSS 2013.
[45]
Benjamin Livshits, Aditya V. Nori, Sriram K. Rajamani, and Anindya Banerjee. 2009. Merlin: Specification Inference for Explicit Information Flow Problems. SIGPLAN Notices 44, 6 (June 2009), 75--86.
[46]
Druce MacFarlane. 2018. Threat Detection: ItâĂŹs About 'TimeâĂŹA. https://www.csoonline.com/article/3304252/threat-detection-it-s-about-time.html
[47]
Pratyusa K. Manadhata and Jeannette M. Wing. 2011. An Attack Surface Metric. IEEE Transactions on Software Engineering 37, 3 (2011), 371--386.
[48]
William S. McPhee. 1974. Operating system integrity in OS/VS2. IBM Systems Journal 13 (September 1974), 230--252. Issue 3.
[49]
Shagufta Mehnaz, Anand Mudgerikar, and Elisa Bertino. 2018. RWGuard: A Real-Time Detection System Against Cryptographic Ransomware. In Proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses.
[50]
Trend Micro. 2014. Summary of Shellshock-Related Stories and Materials. https://blog.trendmicro.com/trendlabs-security-intelligence/summary-of-shellshock-related-stories-and-materials/
[51]
MITRE. 2014. Shellshock CVE 6271. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
[52]
Divya Muthukumaran, Sandra Rueda, Nirupama Talele, Hayawardh Vijayakumar, Jason Teutsch, Trent Jaeger, and Nigel Edwards. 2012. Transforming Commodity Security Policies to Enforce Clark-Wilson Integrity. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC 2012).
[53]
Luis MuÃśoz-GonzÃąlez, Daniele Sgandurra, Andrea Paudice, and Emil C. Lupu. 2016. Efficient Attack Graph Analysis through Approximate Inference. arXiv'19: https://arxiv.org/abs/1606.07025.
[54]
Andrew C. Myers. 1999. JFlow: Practical Mostly-Static Information Flow Control. In Proceedings of the 26th ACM Symposium on Principles of Programming Languages (POPL 1999). 228--241.
[55]
Andrew C. Myers and Barbara Liskov. 1997. A Decentralized Model for Information Flow Control. In Proceedings of the 16th ACM Symposium on Operating System Principles.
[56]
Andrew C. Myers and Barbara Liskov. 1998. Complete, Safe Information Flow with Decentralized Labels. In Proceedings of the 1998 IEEE Symposium on Security and Privacy.
[57]
Santosh Nagarakatte, Jianzhou Zhao, Milo M.K. Martin, and Steve Zdancewic. 2009. SoftBound: Highly Compatible and Complete Spatial Memory Safety for C. In Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation.
[58]
George C. Necula, Scott McPeak, and Westley Weimer. 2002. CCured: Type-safe Retrofitting of Legacy Code. In Proceedings of the ACM Conference on the Principles of Programming Languages.
[59]
Palo Alto Networks. 2019. What Is An Intrusion Prevention System? https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips
[60]
Steven Noel and Sushil Jajodia. 2008. Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs. Journal of Network and Systems Management 16, 3 (Sep 2008), 259--275.
[61]
Steven Noel, Sushil Jajodia, Brian O'Berry, and Michael Jacobs. 2003. Efficient Minimum-cost Network Hardening via Exploit Dependency Graphs. In Proceedings of the 19th Annual Computer Security Applications Conference. 86--95.
[62]
Steven Noel, Eric Robertson, and Sushil Jajodia. 2004. Correlating Intrusion Events and Building Attack Scenarios through Attack Graph Distances. In Proceedings of the 20th Annual Computer Security Applications Conference. 350--359.
[63]
Open Information Security Foundation (OISF). 2010. Suricata. https://suricata-ids.org/
[64]
Xinming Ou, Wayne F. Boyer, and Miles A. McQueen. 2006. A scalable approach to attack graph generation. In Proceedings of the 13th ACM Conference on Computer and Communications Security. 336--345.
[65]
Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, and Ananthram Swami. 2016. The Limitations of Deep Learning in Adversarial Settings. In Proceedings of the 2016 IEEE European Symposium on Security and Privacy. 372--387.
[66]
Vern Paxson. 1999. Bro: A System for Detecting Network Intruders in Real-time. Computer Networks 31, 23--24 (Dec. 1999), 2435--2463.
[67]
Cynthia Phillips and Laura Painton Swiler. 1998. A Graph-based System for Network-vulnerability Analysis. In Proceedings of the 1998 New Security Paradigms Workshop (NSPW 1998). 71--79.
[68]
Wolter Pieters. 2019. Everything-as-a-Hack: Claims-Making for Access to Digital and Social Resources. In Proceedings of the 2019 New Security Paradigms Workshop. ACM.
[69]
Devin J. Pohly, Stephen McLaughlin, Patrick McDaniel, and Kevin Butler. 2012. Hi-Fi: Collecting High-Fidelity Whole-System Provenance. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12). 259--268.
[70]
Nayot Poolsappasit, Rinku Dewri, and Indrajit Ray. 2012. Dynamic Security Risk Management using Bayesian Attack Graphs. IEEE Transactions on Dependable and Secure Computing 9, 1 (2012), 61âĂŞ--74.
[71]
Quadrantsec. 2015. Sagan. https://quadrantsec.com/
[72]
Elias Raftopoulos and Xenofontas Dimitropoulos. 2011. Detecting, Validating and Characterizing Computer Infections in the Wild. In Proceedings of the 2011 Internet Measurement Conference.
[73]
Martin Roesch. 1999. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the 13th USENIX Conference on System Administration (LISA 1999). 229--238.
[74]
Sandra Rueda, David H. King, and Trent Jaeger. 2008. Verifying Compliance of Trusted Programs. In Proceedings of the 17th USENIX Security Symposium. 321--334.
[75]
Bruce Schneier. 2000. Secrets & Lies: Digital Security in a Networked World (1st ed.). John Wiley & Sons, Inc., New York, NY, USA.
[76]
SELinux 2017. SELinux Project Wiki. https://selinuxproject.org/page/Main_Page.
[77]
Dave Shackleford. 2018. Intrusion Detection Evasion Techniques and Case Studies. STI Graduate Student Research in SANS. https://www.sans.org/reading-room/whitepapers/detection/paper/38350
[78]
Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, and Jeannette M. Wing. 2002. Automated Generation and Analysis of Attack Graphs. In 2002 IEEE Symposium on Security and Privacy. 273--284.
[79]
SolarWinds 2019. SolarWinds. https://www.solarwinds.com/
[80]
Robin Sommer and Vern Paxson. 2010. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. In Proceedings of the 2010 IEEE Symposium on Security and Privacy. 305--316.
[81]
Dokyung Song, Julian Lettner, Prabhu Rajasekaran, Yeoul Na, Stijn Volckaert, Per Larsen, and Michael Franz. 2018. SoK: Sanitizing for Security. CoRR abs/1806.04355 (2018).
[82]
Nirupama Talele, Jason Teutsch, Robert F. Erbacher, and Trent Jaeger. 2014. Monitor Placement for Large-Scale Systems. In Proceedings of the 19th ACM Symposium on Access Control Models and Technologies. 29--40.
[83]
Nirupama Talele, Jason Teutsch, Trent Jaeger, and Robert F. Erbacher. 2013. Using Security Policies to Automate Placement of Network Intrusion Prevention. In Proceedings of the 5th International Symposium on Engineering Secure Software and Systems. 17--32.
[84]
Christopher Theisen, Kim Herzig, Patrick Morrison, Brendan Murphy, and Laurie Williams. 2015. Approximating Attack Surfaces with Stack Traces. In Proceedings of the 37th International Conference on Software Engineering - Volume 2 (ICSE 2015). 199--208.
[85]
Fredrik Valeur, Giovanni Vigna, Christopher Kruegel, and Richard A. Kemmerer. 2004. Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Transactions on Dependable and Secure Computing 1, 3 (2004), 146âĂŞ--169.
[86]
Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, and Trent Jaeger. 2014. JIGSAW: Protecting Resource Access by Inferring Programmer Expectations. In Proceedings of the 23rd USENIX Security Symposium.
[87]
Hayawardh Vijayakumar, Joshua Schiffman, and Trent Jaeger. 2012. Integrity Walls: Finding attack surfaces from mandatory access control policies. In Proceeedings of the 7th ACM Symposium on Information, Computer, and Communications Security (ASIACCS 2012).
[88]
Hayawardh Vijayakumar, Joshua Schiffman, and Trent Jaeger. 2012. STING: Finding Name Resolution Vulnerabilities in Programs. In Proceedings of the 21st USENIX Security Symposium.
[89]
Lingyu Wang, Anyi Liu, and Sushil Jajodia. 2006. Using Attack Graphs for Correlating, Hypothesizing, and Predicting Intrusion Alerts. Computer Communications 29, 15 (Sept. 2006), 2917--2933.
[90]
Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert Norton, Michael Roe, Stacey Son, and Munraj Vadera. 2015. CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. In Proceedings of the 2015 IEEE Symposium on Security and Privacy. 20--37.
[91]
Rainer Wichmann. 2006. SAMHAIN. https://la-samhna.de/samhain/
[92]
Wikipedia contributors. 2019. Vulnerability (computing)---Wikipedia, The Free Encyclopedia. https://en.wikipedia.org/wiki/Vulnerability_(computing) [Online; accessed 17-November-2019].
[93]
Wei Wu, Yueqi Chen, Jun Xu, Xinyu Xing, Xiaorui Gong, and Wei Zou. 2018. FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities. In Proceedings of the 27th USENIX Security Symposium. 781--797.
[94]
Peng Xie, Jason H. Li, Xinming Ou, Peng Liu, and Renato Levy. 2010. Using Bayesian Networks for Cyber Security Analysis. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 211âĂŞ--220.
[95]
Wenjuan Xu, Xinwen Zhang, and Gail-Joon Ahn. 2009. Towards System Integrity Protection with Graph-Based Policy Analysis. In Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference Data and Applications Security. 65--80.
[96]
Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, and David MaziÃÍres. 2006. Making Information Flow Explicit in HiStar. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI 2006).

Cited By

View all
  • (2024)GNN-IDS: Graph Neural Network based Intrusion Detection SystemProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664515(1-12)Online publication date: 30-Jul-2024
  • (2024)A Survey on Graph Neural Networks and its Applications in Various DomainsSN Computer Science10.1007/s42979-024-03543-46:1Online publication date: 21-Dec-2024
  • (2023)Optimal monitoring and attack detection of networks modeled by Bayesian attack graphsCybersecurity10.1186/s42400-023-00155-y6:1Online publication date: 1-Sep-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
NSPW '19: Proceedings of the New Security Paradigms Workshop
September 2019
136 pages
ISBN:9781450376471
DOI:10.1145/3368860
© 2019 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Sponsors

  • ACSA: Applied Computing Security Assoc

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 January 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attack graphs
  2. attack surface
  3. intrusion detection

Qualifiers

  • Research-article

Funding Sources

Conference

NSPW '19
Sponsor:
  • ACSA
NSPW '19: New Security Paradigms Workshop
September 23 - 26, 2019
San Carlos, Costa Rica

Acceptance Rates

Overall Acceptance Rate 98 of 265 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)217
  • Downloads (Last 6 weeks)25
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)GNN-IDS: Graph Neural Network based Intrusion Detection SystemProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664515(1-12)Online publication date: 30-Jul-2024
  • (2024)A Survey on Graph Neural Networks and its Applications in Various DomainsSN Computer Science10.1007/s42979-024-03543-46:1Online publication date: 21-Dec-2024
  • (2023)Optimal monitoring and attack detection of networks modeled by Bayesian attack graphsCybersecurity10.1186/s42400-023-00155-y6:1Online publication date: 1-Sep-2023
  • (2023)Triaging Android Systems Using Bayesian Attack Graphs2023 IEEE Secure Development Conference (SecDev)10.1109/SecDev56634.2023.00031(171-183)Online publication date: 18-Oct-2023
  • (2022)IOTA: A Framework for Analyzing System-Level Security of IoTs2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI)10.1109/IoTDI54339.2022.00017(143-155)Online publication date: May-2022
  • (2022)Unsupervised Abnormal Traffic Detection through Topological Flow Analysis2022 14th International Conference on Communications (COMM)10.1109/COMM54429.2022.9817285(1-6)Online publication date: 16-Jun-2022
  • (2022)Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic ReviewIEEE Access10.1109/ACCESS.2022.315306410(21742-21758)Online publication date: 2022
  • (2022)LMTrackerNeurocomputing10.1016/j.neucom.2021.12.026474:C(37-47)Online publication date: 6-May-2022
  • (2021)Automated Bug Hunting With Data-Driven Symbolic Root Cause AnalysisProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3485363(320-336)Online publication date: 12-Nov-2021
  • (2021)SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil?IEEE Security & Privacy10.1109/MSEC.2021.305043319:2(14-19)Online publication date: Mar-2021
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media