GARNET: A Graphical Attack graph and Reachability Network Evaluation Tool

被引:0
|
作者
Williams, Leevar [1 ]
Lippmann, Richard [1 ]
Ingols, Kyle [1 ]
机构
[1] MIT, Lincoln Lab, Lexington, MA 02173 USA
关键词
attack graph; visualization; treemap; security metrics; adversary model; network; vulnerability; exploit; attack path; recommendation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Attack graphs enable computation of important network security metrics by revealing potential attack paths an adversary could use to gain control of network assets. This paper presents GARNET (Graphical Attack graph and Reachability Network Evaluation Tool), an interactive visualization tool that facilitates attack graph analysis. It provides a simplified view of critical steps that can be taken by an attacker and of host-to-host network reachability that enables these exploits. It allows users to perform "what-if" experiments including adding new zero-day attacks, following recommendations to patch software vulnerabilities, and changing the attacker starting location to analyze external and internal attackers. Users can also compute and view metrics of assets captured versus attacker effort to compare the security of complex networks. For adversaries with three skill levels, it is possible to create graphs of assets captured versus attacker steps and the number of unique exploits required. GARNET is implemented as a Java application and is built on top of an existing C++ engine that performs reachability and attack graph computations. An initial round of user evaluations described in this paper led to many changes that significantly enhance usability.
引用
收藏
页码:44 / 59
页数:16
相关论文
共 50 条
  • [1] Naggen: a Network Attack Graph GENeration Tool
    Barrere, Martin
    Lupu, Emil C.
    [J]. 2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 378 - 379
  • [2] An interactive attack graph cascade and reachability display
    Williams, L.
    Lippmann, R.
    Ingols, K.
    [J]. VIZSEC 2007, 2008, : 221 - 236
  • [3] An Integrated Network Scanning Tool for Attack Graph Construction
    Cheng, Feng
    Roschke, Sebastian
    Meinel, Christoph
    [J]. ADVANCES IN GRID AND PERVASIVE COMPUTING, 2011, 6646 : 138 - 147
  • [4] Attack graph based evaluation of network security
    Kotenko, Igor
    Stepashkin, Mikhail
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227
  • [5] Attack graph reachability: concept, analysis, challenges and issues
    Al-Araji, Zaid J
    Ahmed, Sharifah Sakinah Syad
    Abdullah, Raihana Syahirah
    Mutlag, Ammar Awad
    Raheem, Hayder Adil Abdul
    Basri, Siti Rohanah Hasan
    [J]. Network Security, 2021, 2021 (06) : 13 - 19
  • [6] On the evaluation of large and sparse graph reachability queries
    Chen, Yangjun
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, 5181 : 97 - 105
  • [7] Computer network security evaluation method based on improved attack graph
    Li, Zhaocui
    Liu, Huichuan
    Wu, Chunyan
    [J]. Journal of Cyber Security Technology, 2022, 6 (04) : 201 - 215
  • [8] Evaluation of Network Risk Using Attack Graph Based Security Metrics
    Kumar, Santosh
    Negi, Anuradha
    Prasad, Keshav
    Mahanti, Aniket
    [J]. 2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 91 - 93
  • [9] A scalable algorithm for network reachability analysis with cyclic attack graphs
    Zenitani, Kengo
    [J]. JOURNAL OF COMPUTER SECURITY, 2023, 31 (01) : 29 - 55
  • [10] A TOOL FOR GRAPHICAL NETWORK MODELING AND ANALYSIS
    VANZIJL, L
    MITTON, D
    CROSBY, S
    [J]. IEEE SOFTWARE, 1992, 9 (01) : 47 - 54