BULDYZHOV V. I.
ABSTRACT
Development of attack resistance estimation method is proposed aimed at quantitative estimation of risk level of unknown vulnerabilities and at development of the process of such risks managing
KEYWORDS
risk management, zero-day vulnerabilities, attack resistance.
REFERENCES
1. Stephenson, P. “Using formal methods for forensic analysis of intrusion events - a preliminary examination”, available at: http://www.imfgroup.com/Document Library.html.
2. Amenaza “A Quick Tour of Attack Tree Based Risk Analysis Using”, available at:http://www.amenaza.com .
3. Cuppens, F. (2002), “Alert Correlation in a Cooperative Intrusion Detection Framework”, Proc. of the 2002 IEEE Symposium on Security and Privacy, 2002, available at: hti>://citeseerx.istpsu.edu/viewdoc/download?doi=l0.1.1.103.8332&rep=rep 1 &type=pdf.
4. Camtepe, S. and Yener, B. “A Formal Method for Attack Modeling and Detection”, available at: http://cs.rpi.edu/research/pdf/06-01.pdf .
5. Danforth, M. “Models for Threat Assessment in Networks”, available at: http://www.cs.ucdavis.edu/research/tech-reports/2006/CSE-2006-13.pdf .
6. Jajodia, S. and Noel, S. (2004), “Managing Attack Graph Complexity Through Visual Hierarchical Aggregation”, In 1st Intern. Workshop on Visualization and Data Mining for Computer Security, Washington, DC, pp. 109-118.
7. “The Systems Security Engineering Capability Maturity Model”, available at: http://www.ssecmm.org/index.html .
8. Swanson, М, Bartol, N., Sabato, J. and et al. (2003), “Security Metrics Guide for Information Technology Systems. Special Publication 800-55”, National Institute of Standards and Technology, available at: http://www.rootsecure.net/con- tent/downloads/pdf7nist_security_metrics_guide.pdf.
9. Stoneburner, G., Hayden, C. and Feringa, A. (2004), “Engineering Principles for Information Technology Security. Special Publication 800-27 (Rev A)”, National Institute of Standards and Technology, available at: http://csrc.nist.gov/publi- cations/nistpubs/800-27A/SP800-27-RevA.pdf.
10. Chew, E., Swanson, M., Stine, К. and et al. (2008), “NIST Special Publication 800-55. Revision 1.Performance Measurement Guide for Information Security”,available at: http://csrc.nist.gov/publications/nis^pubs/800-55-Revl/SP800-55-revl .pdf.
11. Stoneburner, G., Goguen, A. and Feringa, A. (2001), “NIST Special Publication 800-30: Risk Management Guide for Information Technology Systems”, available at: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf .
12. Mell, P., Scarforne, К. and Romanosky, S. “A Complete Guide to the Common Vulnerability Scoring System (CVSS). Version 2.0.”, available at: http://www.first.org/cvss/cvss-guide.html .
13. Ritchey, R. and Аmmаnn, Р. (2000), “Using Model Checking to Analyze Network Vulnerabilities “, Proc. IEEE Symposium on Security and Privacy, available at: http://www.cs.washington.edu/research/projecWpoirae/Oaldand/sp/PAPERS/0007_17.PDF .
14. Sheyner, О, Haines, J., Jha, S. and et al. (2002), “Automated Generation and Analysis of Attack Graphs”, Ibid., available at: http://wiki.cac.washington.edu/ download/attachmmts/100(W785/Automated^
15. Аmmаnn, Р., Wijesekera, D. and Kaushik, S. (2002), “Scalable, Graph-Based Network Vulnerability Analysis”, Proc. Conf. on Computer and Communications Security, available at: http://mason.gmu.edu/~skaushik/index_files/pl60-ammann.pdf .
16. Lippmann, R., Ingols, К., Scott, С. and et al. “Validating and Restoring Defense in Depth Using Attack Graphs”, MILCOM Military Communications Conference, available at: http://www.ll.mit.edu/mission/communications/ist/publica- tions/ 061023_Lippmann.pdf.
17. Noel, S. and Jajodia, J. (2005), “Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices”, Proc. 21st Annual Computer Security Applications Conf., available at: http://www.acsac.org/2005/papers/87.pdf .
18. Noel, S. and Jajodia, S. (2004), “Managing Attack Graph Complexity through Visual Hierarchical Aggregation”, Proc. ACM CCS Workshop on Visualization and Data Mining for Computer Security, available at: http://csis.gmu.edu/noel/pubs/ 2004_VizSec.pdf.
19. Noel, S. and Jajodia, S. (2009), “Advanced Vulnerability Analysis and Intrusion Detection through Predictive Attack Graphs”, Critical Issues in C4I, Armed Forces Communications and Electronics Association (AFCEA) Solutions Series, available at: http://csis.gmu.edu/noel/pubs/2009_c4i.pdf .
20. Noel, S. and Jajodia, S. “Proactive Intrusion Prevention and Response via Attack Graphs”, Practical Intrusion Detection. Ed. by Ryan Trost, Addison-Wesley Professional (in preparation), available at: http://csis.gmu.edu/noel/pubs/ 2008_IDS_ chapter.pdf.
21. Cuppens, F. and Ortalo, R. (2000), “LAMBDA: A Language to Model a Database for Detection of Attacks”, Proc. on Recent Advances in Intrusion Detection, Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs, available at: http://www.springerlink.com/content/4yru642mlЈ354fdv/.
22. Templeton, Levitt К. (2000), “A Requires/Provides Model for Computer Attacks”, Proc. New Security Paradigms Workshop, available at: http://seclab.cs . ucdavis.edu/ papers/NP2000-rev.pdf.
23. Ritchey, R., О'Berry, В. and Noel, S. (2002), “Representing TCP/IP Connectivity for Topological Analysis of Network Security”, Proc. 18th Annual Computer Security Applications Conf.
24. Skybox Security, available at: http://www.skyboxsecurity.com/.
25. RedSeal Systems, available at: http://www.redseal.net/.
26. Lippmann, R. and Ingols, К. (2005), “An Annotated Review of Past Papers on Attack Graphs”, Lincoln Laboratory Technical Report ESC-TR-2005-054.
27. Frigault, M., Wang, L., Singhal, A. and Jajodia, S. (2008), “Measuring Network Security Using Dynamic Bayesian Network”, 2008 ACM Workshop on Quality of Protection, available at: http://csrc.nist.gov/staffi'Singhal/qop2008_DBNjpaper.pdf .
28. Wang, L., Singhal, A. and Jajodia, S. (2007),“Measuring the Overall Security of Network Configurations using Attack Graphs”, Proc. 21st IFIP WG 11.3 Working Conference on Data and Applications Security, Springer-Verlag.
29. Pamula, J., Jajodia, S., Ammann, P. and Swarup, V. (2006), “A Weakest-Adversary Security Metric for Network Configuration Security Analysis”, Proc. 2nd ACM Workshop on Quality of Protection, ACM Press, available at: http://dl.acm.org/cita- tion.cfin?id=l 179502.
30. Wang, L., Islam, Т., Long, T. and et al. (2008), “An Attack Graph Based Probabilistic Security Metrics”, Proc. 22nd IFIP WG 11.3 Working Conference on Data and Application Security (DBSEC 2008), London, 2008, available at: http://www.nist.gov/ iti/csd/singhal-anoop.cfm.
31. Singhal, A. and Xou, S. (2009), “Techniques for Enterprise Network Security Metrics”, Proc. 2009 Cyber Security and Information Intelligence Research Workshop, Oakridge National Labs, 2009, available at: http://www.csiir.oml.gov/csiirw/09/ CSIIRW09-Proceedings/Abstracts/Singhal_abstract.pdf.
32. Manadhata, P., Wing, J., Flynn, M. and McQueen M. (2006), “Measuring the attack surface of two FTP daemons”, Proc. 2nd ACM Workshop on Quality of Protection, available at: http://www.cs.cmu.edu/~pratyus/qop.pdf .
33. Ou, Х., Govindavajhala, S., Appel, A.W. (2005), “MulVAL: A logic-based network security analyzer”, The 14th USENIX Security Symposium, Baltimore, MD, USA, 2005, available at: http://www.cis.ksu.Edu/~xou/publications/mulval_sec05.pdf .