By applying security metrics to computer network pathways, the researchers expect to help managers protect information more efficiently.
The researchers evaluated each path along which a hacker could access a network, and assigned it a risk level based on how challenging it is to the hacker.
The paths and risks involved were determined using a newly-developed technique called “attack graphs” and the National Vulnerability Database (NVD), which is a U.S. government security repository.
“We analyse all of the paths that system attackers could penetrate through a network, and assign a risk to each component of the system,” explained Anoop Singhal, a computer scientist at the National Institute of Standards and Technology (NIST).
“Decision makers can use our assigned probabilities to make wise decisions and investments to safeguard their network.”
The researchers use a simple system in which there is an attacker on a computer, a firewall, router, an FTP server and a database server. The goal for the attacker is to find the simplest path into the database server.
Attack Graph Analysis determines three potential attack paths. For each path in the graph, the NIST researchers assign an attack probability based on the score in the NVD.
One path takes only three steps. The first step has an 80 percent chance of being hacked, the second, a 90 percent chance. The final step requires great expertise, so there is only a 10 percent probability it can be breached.
Because it takes multiple steps to reach the goal, the probabilities of each component are multiplied to determine the overall risk. The example path therefore is found to be reasonably secure, with a less than 10 percent chance of being hacked.
The next step is for the researchers to expand their research to handle large-scale enterprise networks.
NIST researchers map network security risks
By
Staff Writers
on Jul 27, 2008 8:52AM
Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

Build cybersecurity capability with award winning Fortinet training from Ingram Micro

Kaseya Dattocon APAC 2024 is Back

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Tech For Good program gives purpose and strong business outcomes
Ingram Micro Ushers in the Age of Ultra
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report