Featured Research

from universities, journals, and other organizations

Next-generation Software Created To Identify Complex Cyber Network Attacks

Date:
March 18, 2008
Source:
George Mason University
Summary:
Researchers have developed new software that can reduce the impact of cyber attacks by identifying the possible vulnerability paths through an organization's networks. By their very nature networks are highly interdependent and each machine’s overall susceptibility to attack depends on the vulnerabilities of the other machines in the network. Attackers can take advantage of multiple vulnerabilities in unexpected ways, allowing them to incrementally penetrate a network and compromise critical systems.

Researchers in George Mason University’s Center for Secure Information Systems have developed new software that can reduce the impact of cyber attacks by identifying the possible vulnerability paths through an organization’s networks.

Related Articles


By their very nature networks are highly interdependent and each machine’s overall susceptibility to attack depends on the vulnerabilities of the other machines in the network. Attackers can take advantage of multiple vulnerabilities in unexpected ways, allowing them to incrementally penetrate a network and compromise critical systems. In order to protect an organization’s networks, it is necessary to understand not only individual system vulnerabilities, but also their interdependencies.

“Currently, network administrators must rely on labor-intensive processes for tracking network configurations and vulnerabilities, which requires a great deal of expertise and is error prone because of the complexity, volume and frequent changes in security data and network configurations,” says Sushil Jajodia, university professor and director of the Center for Secure Information Systems. “This new software is an automated tool that can analyze and visualize vulnerabilities and attack paths, encouraging ‘what-if analysis’.”

The software developed at Mason, CAULDRON, allows for the transformation of raw security data into roadmaps that allow users to proactively prepare for attacks, manage vulnerability risks and have real-time situational awareness. CAULDRON provides informed risk analysis, analyzes vulnerability dependencies and shows all possible attack paths into a network. In this way, it accounts for sophisticated attack strategies that may penetrate an organization’s layered defenses.

CAULDRON’s intelligent analysis engine reasons through attack dependencies, producing a map of all vulnerability paths that are then organized as an attack graph that conveys the impact of combined vulnerabilities on overall security. To manage attack graph complexity, CAULDRON includes hierarchical graph visualizations with high-level overviews and detail drilldown, allowing users to navigate into a selected part of the big picture to get more information.

“One example of this software in use is at the Federal Aviation Administration. They recently installed CAULDRON in their Cyber Security Incident Response Center and it is helping them prioritize security problems, reveal unseen attack paths and protect across large numbers of attack paths,” says Jajodia. “While currently being used by the FAA and defense community, the software is applicable in almost any industry or organization with a network and resources they want to keep protected, such as banking or education.”

Funding for this software development was provided by the defense, homeland security and intelligence communities and the FAA. Researchers in the Center for Secure Information Systems involved in the software development include Jajodia; Steven Noel, associate director; and Pramod Kalapa, senior research scientist. Five patents are currently pending on the CAULDRON software.


Story Source:

The above story is based on materials provided by George Mason University. Note: Materials may be edited for content and length.


Cite This Page:

George Mason University. "Next-generation Software Created To Identify Complex Cyber Network Attacks." ScienceDaily. ScienceDaily, 18 March 2008. <www.sciencedaily.com/releases/2008/03/080317141210.htm>.
George Mason University. (2008, March 18). Next-generation Software Created To Identify Complex Cyber Network Attacks. ScienceDaily. Retrieved November 1, 2014 from www.sciencedaily.com/releases/2008/03/080317141210.htm
George Mason University. "Next-generation Software Created To Identify Complex Cyber Network Attacks." ScienceDaily. www.sciencedaily.com/releases/2008/03/080317141210.htm (accessed November 1, 2014).

Share This



More Computers & Math News

Saturday, November 1, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Protests Stall Hungary's Internet Tax

Protests Stall Hungary's Internet Tax

Reuters - Business Video Online (Oct. 31, 2014) Hungary will shelve plans to introduce a tax on internet data traffic that has generated big protests over the past week. But as Amy Pollock reports the controversial issue hasn’t gone away entirely. Video provided by Reuters
Powered by NewsLook.com
Samsung's Incredible Shrinking Smartphone Profits

Samsung's Incredible Shrinking Smartphone Profits

Reuters - Business Video Online (Oct. 30, 2014) The world's top mobile maker is under severe pressure, delivering a 60 percent drop in Q3 profit as its handset business struggles. Turning it around may not prove easy, says Reuters' Jon Gordon. Video provided by Reuters
Powered by NewsLook.com
Ban On Wearable Cameras In Movie Theaters Surprises No One

Ban On Wearable Cameras In Movie Theaters Surprises No One

Newsy (Oct. 30, 2014) The Motion Picture Association of America and the National Association of Theatre Owners now prohibit wearable cameras such as Google Glass. Video provided by Newsy
Powered by NewsLook.com
Spain's New 'Google Tax' Makes News Feeds Pay For Links

Spain's New 'Google Tax' Makes News Feeds Pay For Links

Newsy (Oct. 30, 2014) Spanish lawmakers have passed new IP rules requiring aggregators to pay for linking to news sites, following a broader trend across the E.U. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins