Remediating Logical Attack Paths Using Information System Simulated TopologiesReport as inadecuate




Remediating Logical Attack Paths Using Information System Simulated Topologies - Download this document for free, or read online. Document in PDF available to download.

* Corresponding author 1 TSP - Télécom SudParis 2 THALES COMMUNICATIONS & SECURITY 3 Thales Services

Abstract : With the increase of attacks and Information Systems getting ever more complex, security operators need tools to help them protecting critical assets. An attack graph is a model to assess the level of security of an Information System, but it can be used to compute actions that mitigate the modeled threats. In this paper we present a method to remediate the most relevant attack paths extracted from a logical attack graph. In order to help an operator to choose between several remediation candidates, we rank them according to a cost of remediation combining operational and impact costs. We implement this method using MulVAL attack graphs and several publicly available sets of data.

Keywords : logical attack paths remediation candidates MulVAL at-tack graph simulated topology remediation database remediation costs





Author: François-Xavier Aguessy - Lucie Gaspard - Olivier Bettan - Vania Conan -

Source: https://hal.archives-ouvertes.fr/



DOWNLOAD PDF




Related documents