skip to main content
10.1145/310889.310919acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article
Free Access

A graph-based system for network-vulnerability analysis

Published:01 January 1998Publication History
First page image

References

  1. 1.Burch, C., Krumke, S., Marathe, M., Phillips C., and Sundberg, E. "Multicriteria Approximation Through Decomposition", submitted, 1998.Google ScholarGoogle Scholar
  2. 2.Cherkassky, B.V., A.V. Goldberg, and T. Radzik. "Shortest Paths Algorithms: Theory and Experimental Evaluation," Math Programming, 73, pp.129--174, 1996. Web site: http://www.neci .nj .nec.com/homepages/avg/soft/so ft.html Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.Dacier, M., Y. Deswarte, and M. Kaaniche. "Quantitative Assessment of Operational Security: Models and Tools." LAAS Research Report 96493, May 1996.Google ScholarGoogle Scholar
  4. 4.Denning, D. E. "An Intrusion-Detection Model." IEEE Transactions on Software Engineering, 13(2), 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.Garey, M. R. and D. S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, W. H. Freeman and Company, NY, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.Howard, J. D. "An Analysis of Security Incidents on the Internet, 1989-1995." Doctoral dissertation, Carnegie Mellon University, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.Internet Security Systems, Inc. 41 Perimeter Center East, Suite 550, Atlanta, GA 30346. Creator of the X-force database, accessed via http://www.iss.net/xforce.Google ScholarGoogle Scholar
  8. 8.Lundqvist, U. and E. Jonsson. "A Map of Security Risks associated with using COTS." Computer, 31(6): 60-66, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.Lunt, T. F. "A Survey of Intrusion Detection Techniques." Computers and Security 12, pp. 405-418, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.Meadows, C., "A representation of Protocol Attacks for Risk Assessment", Network Threats, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Vol. 38, R. N. Wright and P.G. Neumann editors, American Mathematical Society, pp. 1-10.Google ScholarGoogle Scholar
  11. 11.Moskowithz, I.S, and M. H. Kang, "An Insecurity Flow Model", Proceedings of the Sixth New Security Paradigms Workshop", Langdale, Cumbria, UK, September, 1997, pp. 61-74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.Naor, D. and D. Brutlag, "On suboptimal alignment of biological sequences," Proceedings of the 4th annual Symposium on Combinatorial Pattern Matching, Springer Verlag, 1993, pp. 179-196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.Ortalo, R., Y. Deswarte, and M. Kaaniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security", in Dependable Computing for Critical Applications 6 (DCCA'6), (M.Dal Cin, C. Meadows and W.H. Sanders, Eds.), Grainau, Germany, March 5-7 1997, Dependable Computing and Fault-Tolerant Systems, vol. 11, pp.307-328, ISBN 0-8186-8009-1, IEEE Computer Society Press, 1998.Google ScholarGoogle Scholar
  14. 14.Ortalo, R., Y. Deswarte, "Quantitative Evaluation of Information System Security", in Global IT Security, Proc. of the IFIP TC11 14th International Conference on Information Security (IFIP/SEC'98), (G. Papp, R. Posch, eds.), August 31 - September 4, Vienna-Budapest, Austria-Hungary, Austrian Computer Society, ISBN 3-85403-116-5, pp. 321-332, 1998.Google ScholarGoogle Scholar
  15. 15.Phillips, C. A., "The network inhibition problem," Proceedings of the 25 th Annual ACM Symposium on the Theory of Computing, May 16-18, 1993, pp. 776-785. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.Presidential Commission on Critical Infrastructure Protection. Commission Report "Critical Foundations: Protecting America's Infrastructures," October 1997. Available at: http:l/www.pccip.govlreport index.htmlGoogle ScholarGoogle Scholar
  17. 17.SATAN. (Security Administrator Tool for Analyzing Networks) tool. SATAN's creators, Mr. Dan Farmer and Mr. Wietse Venema, made SATAN widely available over the Internet without cost starting April 5, 1995. It can be obtained from the web site: http:/l 142.3.223.54/~short/SECURITY/satan.htmlGoogle ScholarGoogle Scholar
  18. 18.Tayi, G., Rosencrantz, D. and S. Ravi. "Path Problems in Networks with Vector Valued Edge Weights." Submitted for publication, October 1997.Google ScholarGoogle Scholar
  19. 19.Wyss, G. D., Schriner, H. K., and T. R. Gaylor (1996). "Probabilistic Logic Modeling of for Hybrid Network Architectures." Published in the Proceedings of the 21st IEEE Conference on Local Computer Networks. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A graph-based system for network-vulnerability analysis

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          NSPW '98: Proceedings of the 1998 workshop on New security paradigms
          January 1998
          142 pages
          ISBN:1581131682
          DOI:10.1145/310889

          Copyright © 1998 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 January 1998

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate62of170submissions,36%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader