Performance analysis of automated attack graph generation software
dc.contributor.advisor | Irvine, Cynthia | |
dc.contributor.advisor | Levin, Timothy | |
dc.contributor.author | Cullum, James J. | |
dc.date.accessioned | 2012-03-14T17:35:25Z | |
dc.date.available | 2012-03-14T17:35:25Z | |
dc.date.issued | 2006-12 | |
dc.identifier.uri | https://hdl.handle.net/10945/2515 | |
dc.description.abstract | The current generation of network vulnerability detection software uses databases of known vulnerabilities and scans target networks for these weaknesses. The results can be voluminous and difficult to assess. Thus, the success of this technology has created a need for software to aid in network vulnerability analysis. Although research has shown the effectiveness of automated attack graph generation tools in displaying potential attack paths in a network, research involving the performance of these tools has been limited. Using empirical testing, we have collected quantitative data using CAULDRON, an attack graph generation tool developed at George Mason University, on a collection of simulated networks. By defining our model to include sets of nodes, which allow connectivity from all nodes to all nodes in the set; the number of nodes present in each set, the number of connections between sets; and the number of vulnerabilities per node as our variables, we are able to observe the performance impact on CAULDRON of connectivity and the increased presence of vulnerabilities in our networks. The effect of these variables on processing time and memory usage is presented and can be used as a metric to assess the scalability of this tool within various customer environments. | en_US |
dc.description.uri | http://archive.org/details/performancenalys109452515 | |
dc.format.extent | xiv, 143 p. : col. ill. ; | en_US |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.subject.lcsh | Computer science | en_US |
dc.subject.lcsh | Performance | en_US |
dc.subject.lcsh | Software engineering | en_US |
dc.subject.lcsh | Computers | en_US |
dc.title | Performance analysis of automated attack graph generation software | en_US |
dc.type | Thesis | en_US |
dc.contributor.corporate | Naval Postgraduate School (U.S.). | |
dc.contributor.department | Computer Science | |
dc.identifier.oclc | 80581746 | |
etd.thesisdegree.name | M.S. | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Computer Science | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
etd.verified | no | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.