IDS Sensor Placement Using Attack Graphs

Embodiments of the present invention identify locations to deploy IDS sensor(s) within a network infrastructure and prioritize IDS alerts using attack graph analysis. An attack graph that describes exploitable vulnerability(ies) within a network infrastructure is aggregated into protection domains....

Full description

Saved in:
Bibliographic Details
Main Authors JAJODIA SUSHIL, NOEL STEVEN E
Format Patent
LanguageEnglish
Published 04.03.2010
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Embodiments of the present invention identify locations to deploy IDS sensor(s) within a network infrastructure and prioritize IDS alerts using attack graph analysis. An attack graph that describes exploitable vulnerability(ies) within a network infrastructure is aggregated into protection domains. Edge(s) that have exploit(s) between two protection domains are identified. Sets that contain edge(s) serviced by a common network traffic device are defined. Set(s) that collectively contain all of the edge(s) are selected. The common network traffic device(s) that service the selected sets are identified as the location(s) to deploy IDS sensor(s) within the network infrastructure.
Bibliography:Application Number: US20090548115