kenneth prole scott o’hare, ph.d. applied visions, inc

8
Kenneth Prole Scott O’Hare, Ph.D. Applied Visions, Inc., Secure Decisions division Steven Noel, Ph.D. Center for Secure Information Systems George Mason University

Upload: others

Post on 28-Dec-2021

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Kenneth Prole Scott O’Hare, Ph.D. Applied Visions, Inc

Kenneth Prole Scott O’Hare, Ph.D.

Applied Visions, Inc., Secure Decisions division

Steven Noel, Ph.D. Center for Secure Information Systems

George Mason University

Page 2: Kenneth Prole Scott O’Hare, Ph.D. Applied Visions, Inc

2

Introduction

  Topological Vulnerability Analysis (TVA) attack graph technology   Builds comprehensive input model from network scans

and database of potential attacker exploits   Analyzes vulnerability dependencies and

models attack paths into a network   Discovers attack paths that convey the impact of

individual and combined vulnerabilities on overall security

  New visualization approach   Dynamic interlinked views with high-level overview and

detail drilldown

Page 3: Kenneth Prole Scott O’Hare, Ph.D. Applied Visions, Inc

3

Architecture

What-If Network Attack Model

Network

Network Hardening

Visualization

Page 4: Kenneth Prole Scott O’Hare, Ph.D. Applied Visions, Inc

4

Evolution Stage 1: Single Attack Paths

Page 5: Kenneth Prole Scott O’Hare, Ph.D. Applied Visions, Inc

5

Evolution Stage 2: All Paths

Page 6: Kenneth Prole Scott O’Hare, Ph.D. Applied Visions, Inc

6

Evolution Stage 3: Graph Aggregation

Page 7: Kenneth Prole Scott O’Hare, Ph.D. Applied Visions, Inc

7

Evolution Stage 4: Interactive Visualization

Page 8: Kenneth Prole Scott O’Hare, Ph.D. Applied Visions, Inc

8

Next Evolution in Attack Graph Visual Analysis

Overview Pane

Tree View

Harden List Exploit

Table

Graph View

Exploit Field

Defense

Toolbars