Share Email Print

Proceedings Paper

Analysis and visualization of large complex attack graphs for networks security
Author(s): Hongda Chen; Genshe Chen; Erik Blasch; Martin Kruger; Irma Sityar
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

In this paper, we have proposed a comprehensive and innovative approach for analysis and visualization of large complex multi-step cyber attack graphs. As an automated tool for cyber attack detection, prediction, and visualization, the newly proposed method transforms large quantities of network security data into real-time actionable intelligence, which can be used to (1) provide guidance on network hardening to prevent attacks, (2) perform real-time attack event correlation during active attacks, and (3) formulate post-attack responses. We show that it is possible to visualize the complex graphs, including all possible network attack paths while still keeping complexity manageable. The proposed analysis and visualization tool provides an efficient and effective solution for predicting potential attacks upon observed intrusion evidence, as well as interactive multi-resolution views such that an analyst can first obtain high-level overviews quickly, and then drill down to specific details.

Paper Details

Date Published: 9 April 2007
PDF: 11 pages
Proc. SPIE 6570, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, 657004 (9 April 2007); doi: 10.1117/12.720035
Show Author Affiliations
Hongda Chen, Intelligent Automation, Inc. (United States)
Genshe Chen, Intelligent Automation Inc. (United States)
Erik Blasch, Air Force Research Lab. (United States)
Martin Kruger, Office of Naval Research (United States)
Irma Sityar, Alion Science and Technology (United States)

Published in SPIE Proceedings Vol. 6570:
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007
Belur V. Dasarathy, Editor(s)

© SPIE. Terms of Use
Back to Top