10.3. Attack Graph
Attack graph is the basis of the vulnerability-centric approach we are going to discuss in the rest of this chapter. This section briefly reviews relevant concepts and states our assumptions. Attack graphs represent prior knowledge about network connectivity and the dependency between vulnerabilities. There have been two different representations for an attack graph. First, an attack graph can explicitly enumerate possible sequences of vulnerabilities (i.e., attack paths) that an attacker can follow [2,34]. Second, an attack graph can be represented by the dependency relationships among vulnerabilities, whence attack paths are encoded implicitly [3]. This representation does not lose any information under the monotonicity assumption, ...
Get Information Assurance now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.