UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 2 Issue 1
January-2015
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1501003


Registration ID:
150004

Page Number

13-21

Share This Article


Jetir RMS

Title

Placement of Sensor using Attack Graph

Abstract

Attack graphs are useful for network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patching the vulnerabilities and configuration errors thatallow the attackers the greatest amount of access.We describe the optimal placement of intrusion detection system (IDS) sensors andprioritization of IDS alarms, using attack graph analysis. Our attack graphs predict the various possible ways of penetrating a network to reach critical assets. .We have created a new type of attack graph, the multiple-prerequisitegraph, and that scales nearly linearly as the size of a typical network increases. We have built a prototype system usingthis graph type. In particular, automated analysis of network configuration and attacker exploits provides an attack graph showing all possiblepaths to critical assets. We then place IDS sensors to cover all these paths, using the fewestnumber of sensorsthe prototype uses readily available source data to automatically compute network reachability, classify vulnerabilities, build the graph, and recommend actions to improve network security.Then, through our predictive vulnerability-based attack graphs, weprioritize IDS alarms based on their level of threat (attack graph distance) to critical assets. The predictive power of our attack graphs then provides the necessary context for appropriate attack response.We have tested the prototype on an operational network with over 180 nodes, where it helped to discover a previously unknown configuration error.

Key Words

IDS,MOGA

Cite This Article

"Placement of Sensor using Attack Graph", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.2, Issue 1, page no.13-21, January-2015, Available :http://www.jetir.org/papers/JETIR1501003.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Placement of Sensor using Attack Graph", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.2, Issue 1, page no. pp13-21, January-2015, Available at : http://www.jetir.org/papers/JETIR1501003.pdf

Publication Details

Published Paper ID: JETIR1501003
Registration ID: 150004
Published In: Volume 2 | Issue 1 | Year January-2015
DOI (Digital Object Identifier):
Page No: 13-21
Country: Sangli, Maharshtra, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003153

Print This Page

Current Call For Paper

Jetir RMS