- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources4
- Resource Type
-
0003000001000000
- More
- Availability
-
40
- Author / Contributor
- Filter by Author / Creator
-
-
George, Rahul (4)
-
Jaeger, Trent (4)
-
Huang, Kaiming (2)
-
Qian, Zhiyun (2)
-
Burke, Quinn (1)
-
Capobianco, Frank (1)
-
Chan, Kevin (1)
-
Chen, Haining (1)
-
Chen, Mingming (1)
-
Krishnamurthy, Srikanth (1)
-
La Porta, Thomas F. (1)
-
La_Porta, Thomas (1)
-
Lee, Yu-Tsung (1)
-
McDaniel, Patrick (1)
-
Mehmeti, Fidan (1)
-
Ostrowski, Kyle (1)
-
Payer, Mathias (1)
-
Yu, Paul (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Lee, Yu-Tsung; George, Rahul; Chen, Haining; Chan, Kevin; Jaeger, Trent (, 2023 IEEE Secure Development Conference)
-
Burke, Quinn; Mehmeti, Fidan; George, Rahul; Ostrowski, Kyle; Jaeger, Trent; La Porta, Thomas F.; McDaniel, Patrick (, IEEE Transactions on Network and Service Management)
-
Capobianco, Frank; George, Rahul; Huang, Kaiming; Jaeger, Trent; Krishnamurthy, Srikanth; Qian, Zhiyun; Payer, Mathias; Yu, Paul (, New Security Paradigms Workshop)Intrusion detection systems are a commonly deployed defense that examines network traffic, host operations, or both to detect attacks. However, more attacks bypass IDS defenses each year, and with the sophistication of attacks increasing as well, we must examine new perspectives for intrusion detection. Current intrusion detection systems focus on known attacks and/or vulnerabilities, limiting their ability to identify new attacks, and lack the visibility into all system components necessary to confirm attacks accurately, particularly programs. To change the landscape of intrusion detection, we propose that future IDSs track how attacks evolve across system layers by adapting the concept of attack graphs. Attack graphs were proposed to study how multi-stage attacks could be launched by exploiting known vulnerabilities. Instead of constructing attacks reactively, we propose to apply attack graphs proactively to detect sequences of events that fulfill the requirements for vulnerability exploitation. Using this insight, we examine how to generate modular attack graphs automatically that relate adversary accessibility for each component, called its attack surface, to flaws that provide adversaries with permissions that create threats, called attack states, and exploit operations from those threats, called attack actions. We evaluate the proposed approach by applying it to two case studies: (1) attacks on file retrieval, such as TOCTTOU attacks, and (2) attacks propagated among processes, such as attacks on Shellshock vulnerabilities. In these case studies, we demonstrate how to leverage existing tools to compute attack graphs automatically and assess the effectiveness of these tools for building complete attack graphs. While we identify some research areas, we also find several reasons why attack graphs can provide a valuable foundation for improving future intrusion detection systems.more » « less
An official website of the United States government

Full Text Available