<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Feb</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Parametric Attack Graph Construction and ⋆ Analysis</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Leanid Krautsevich ⋆⋆</string-name>
          <email>krautsev@di.unipi.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, University of Pisa Largo Bruno Pontecorvo 3, Pisa 56127, Italy Istituto di Informatica e Telematica</institution>
          ,
          <addr-line>Consiglio Nazionale delle Ricerche Via G. Moruzzi 1, 56124 Pisa</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2012</year>
      </pub-date>
      <volume>15</volume>
      <issue>2012</issue>
      <abstract>
        <p>We present the first steps towards an implementation of attack graph construction and analysis technique based on inference rules. In our model, XML credentials describe basic attacks to the system, then inference rules allow composition of new attacks. We aim at modifying previously developed algorithm for the analysis of transitive trust models to the analysis of attack graphs. Important peculiarity of our model is exploitation of c-semirings for evaluation of system security level. Csemirings allow an application of the same algorithms for an analysis of attack graphs regardless of what metric is selected for the evaluation.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Analysis and improvement of security of modern computer systems is a
challenging task because the systems are extremely complex and heterogeneous. Often
the analysis of security is based on attack graphs. Frequently, methods of the
analysis are system and context specific and require manual adjustments.
Moreover, most of the methods provide their own basic metric as the result of the
analysis. We aim at creating a method that allows automated analysis of system
security and works with wide range of security metrics without changing the core
algorithm. Using different metrics for the evaluation helps to provide different
views on system security and allows a security administrator to judge better on
improvements to security of a system.</p>
      <p>
        The essential elements of our method are basic attacks described as XML
credentials similar to RTML [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Basic attacks form an attack graph with the
nodes representing sets of resources and the edges representing the attacks. All
the edges are labelled with costs of attacks. We introduce three inference rules,
that allows us to make conclusions on the system security. The rules are
compliant with rules presented for reasoning on transitive trust models. Thus, we can
adopt an earlier developed algorithm [
        <xref ref-type="bibr" rid="ref11 ref5">11,5</xref>
        ] for the analysis of the attack graphs.
      </p>
      <p>We assume, that costs of attacks stand for security metrics, used for the
evaluation of the system security. We associate each security metric with
csemiring which is algebraic structure used for the analysis of weighted graphs,
e.g., for searching a shortest path in a graph. C-semirings allow to create an
algorithm for the analysis of attack graphs that does not depend on the security
metric selected for the analysis of the system.
1.1</p>
      <p>Contributions
Main contributions of the paper are the following:
– the method for the analysis of attack graphs is based on inference rules
similar to ones used for the analysis of transitive trust models, thus, the
method may reuse the slightly changed algorithm developed for the analysis
of transitive trust models;
– the method works regardless of the security metric selected for the evaluation
due to the use of c-semiring algebraic structure.</p>
      <p>The rest of the paper is structured as follows. Section 2 describes an
application scenario and introduces inference rules. Section 3 discusses the exploitation
of XML for representing basic attacks and introduces XML based rules for the
processing of attacks. Section 4 observes the related work and Sect. 5 provides
the conclusion and the future work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Application Scenario</title>
      <p>We consider a scenario where a security administrator performs the evaluation
of security on the basis of resources available to an attacker. The features and
the notation of the model: AT T = {a1, . . . , am} is a set of attacks to a system,
RES = {r1, . . . , rn} is a set of resources in the system, S = {a1 . . . ak | a ∈ AT T }
is an attack sequence, R is a set of resources available to the attacker, G is a set
of resources gained as the result of an attack, w is a cost of the attack, W is a
cost of the attack sequence.</p>
      <p>There is a set of basic attacks that can be applied when the attacker has
an initial set of resources. The attacker obtains new resources by applying an
attack. In our model, the resources are not consumed and the resources that can
not be reached are not taken into account. We also consider the sequential
composition of attacks, i.e., the attacker can perform attacks one by one. Moreover,
all the attacks have costs, thus, all the potential resources are reachable with
the corresponding costs. The attacker selects the attack with the best cost, e.g.,
the highest probability of success.</p>
      <p>
        We introduce two operators ⊗, ⊕ over some domain D of values of costs,
where the former operator serves for aggregation of costs of attacks in a sequence
and the latter operator for the selection of the attack with the better cost. For
example, the operator ⊗ equals × (multiplication), ⊕ equals max that stands for
the selection of the attack sequence with the maximal probability of success, and
the domain is D = [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ]. We can extend this basic set of operators to couples
(sequence, cost). Suppose, there are sequences of attacks a1, a2 with costs w1, w2:
(a1, w1) ⊗′ (a2, w2) = (a1a2, w1 ⊗ w2)
(a1, w1) ⊕′ (a2, w2) =
((a1, w1)
(a2, w2)
if (w1 ⊕ w2) = w1
if (w1 ⊕ w2) = w2
(1)
(2)
(3)
where a1a2 is an order preserving concatenation of attacks.
      </p>
      <p>Now we are ready to present three inference rules that allow us to analyse
the above model.</p>
      <p>First, we consider a set of resources available, say RX . By starting from this
set of resources, an intruder can perform a basic attack that simply needs a subset
Ri of these resources and then acquires new resources Gj . This is modelled by
the basic attack rule</p>
      <p>(aq,wq) Rj
Ri −→</p>
      <p>Ri ⊆ RX</p>
      <p>RX (a−q,→wq) Rt
where Rj = Ri ∪ Gj and Rt = RX ∪ Gj .</p>
      <p>Then it is possible to compose several different basic attacks in a sequence
and this is done by the composite attack rule. It states that starting from a
set of resources by applying an attack the intruder gets new resources that serve
as a basic set for another attack. Thus, a sequence of attacks is built.</p>
      <p>Finally, the attack selection rule selects the attack with the better cost.</p>
      <p>Ri (a−q,→wq) Rj</p>
      <p>Rj (a−p,→wp) Rk</p>
      <p>Ri (aq,wq−)⊗→′(ap,wp) Rk
Ri (a−q,→wq) Rj</p>
      <p>Ri (a−p,→wp) Rj
Ri</p>
      <p>(aq,wq−)⊕→′(ap,wp) Rj</p>
      <p>Rules 2 and 3 may be generalized for an application to attack sequences by
using S and W instead of a and w.</p>
      <p>The analysis of a system works as follows. Starting from the initial set of
basic attacks, we build a graph whose nodes are sets of resources R and which
arcs are labelled with attack costs. We need to apply the rules and to consider
all the sequences exiting from the initial set Ri to the state Ri ∪ Gk and which
cost is better than a total cost W . The overall protection goal can be to avoid
the attacker to control the set of resources Ri ∪ Gk with the total cost better
than the total cost W .</p>
      <p>
        We propose to present costs as a special mathematical structure c-semiring
(constraint semiring) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]:
      </p>
      <p>Definition 1. C-semiring T is a tuple hD, ⊕, ⊗, 0, 1i:
– D is a set of elements and 0, 1 ∈ D;
– ⊕, is an additive operator defined over (possibly infinite) set of elements D,
for d1, d2, d3 ∈ T , it is commutative (d1 ⊕ d2 = d2 ⊕ d1) and associative
(d1 ⊕ (d2 ⊕ d3) = (d1 ⊕ d2) ⊕ d3), and 0 is a unit element of the additive
operator (d1 ⊕ 0 = d1 = 0 ⊕ d1).
– ⊗ is a binary multiplicative operator, it is associative and commutative, 1
is its unit element (d1 ⊗ 1 = d1 = 1 ⊗ d1), and 0 is its absorbing element
(d1 ⊗ 0 = 0 = 0 ⊗ d1);
– ⊗ is distributive over additive operator (d1 ⊗(d2 ⊕d3) = (d1 ⊗d2)⊕(d1 ⊗d3));
– ≤T is a partial order over the set D, which enables comparing different
elements of the semiring, the partial order is defined using the additive operator
d1 ≤T d2 (d2 is better than d1) iff d1 ⊕ d2 = d2 (idempotence).</p>
      <p>For a security metric, we need to determine the domain of values D and two
operators ⊕ and ⊗ that are further used for the analysis of an attack graph. An
example may be shortest attacks path metric and c-semiring with ⊕ equals min,
⊗ equals summation, and the domain D is the set of natural numbers N. Other
c-semirings may be defined for other metrics.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Using XML Credential to Represent and Reason on</title>
    </sec>
    <sec id="sec-4">
      <title>Attacks</title>
      <p>
        We use XML credentials to store the information about basic attacks. Basic
attacks are used to compute composite attacks sequences. Composite attacks
are also represented by XML credentials and are used when necessary. XML
credentials allow us to use slightly modified algorithm for dealing with trust
relationships for access control systems [
        <xref ref-type="bibr" rid="ref11 ref5">11,5</xref>
        ] to deal with attack graph. Thus,
we use two kinds of credential: one for modelling a basic attack b, and another
one for modelling a composed attack c, where an attacker is A.
      </p>
      <p>In case of a basic attack, a is a sequence which contains only a single attack,
R is the minimal resources necessary to perform the attack, G is the set of gained
resources and w is the cost of the attack:</p>
      <p>A.b(a, R, G, w)</p>
      <p>A.c(S, R, F, W )</p>
      <p>In case of a composite attack, S is a sequence of attacks, R represents the
initial set of resources, F is the final set of resources and W the cost of the attack
sequence S.</p>
      <p>Instantiations of Equations 1, 2, 3 for XML credentials are the following.</p>
      <p>A.b(a, R, G, w) R ⊆ X</p>
      <p>A.c(a, X, X ∪ G, w)
A.c(S1, R1, F1, W1)</p>
      <p>A.c(S2, R2, F2, W2)</p>
      <p>R2 ⊆ F1</p>
      <p>A.c(S1S2, R1, F2, W1 ⊗ W2)
(4)
(5)
(6)
(7)</p>
      <p>A.c(S1, R, F, W1) A.c(S2, R, F, W2)</p>
      <p>
        A.c(S1 ⊙ S2, R, F, W1 ⊕ W2)
(8)
where S1S2 is a concatenation of attack sequences, ⊙ corresponds to the selection
of sequence with the better cost. Now we can adopt algorithm [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] to the analysis
of attack graphs since the rules are similar to rules [
        <xref ref-type="bibr" rid="ref11 ref5">5,11</xref>
        ] for reasoning on trust.
4
      </p>
    </sec>
    <sec id="sec-5">
      <title>Related Work</title>
      <p>
        The attacker model we use in the paper could be seen as an attack graph
[
        <xref ref-type="bibr" rid="ref1 ref12 ref13 ref6">1,13,12,6</xref>
        ]. E.g., in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] a (constrained) graph model based on resource
acquisition by the attacker has been developed, the model considers the local
knowledge of the attacker stored in nodes during the attack-path analysis (also for the
selection of countermeasures).
      </p>
      <p>
        Different security metrics are used for analysis of attack graphs: probability
of successful attack [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], minimal cost of attack [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], minimal cost of reduction
[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], shortest path [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Some of these metrics could be seen as specific instance
of semirings, thus also suitable for the analysis with out approach. On the other
hand, our approach is parametric and can also use other metrics for the analysis.
      </p>
      <p>
        Krautsevich et al., [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] formally modelled and defined several security metrics
which measure security system out of the context. The metrics were analysed in
order to check if some of them provide the same evaluation. The next step in
this study was establishing relations between these metrics and risk [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Every
metric study was considered separately, when our current work is more generic.
      </p>
      <p>
        To our knowledge, there are several attempts of applying semirings in
security area [
        <xref ref-type="bibr" rid="ref2 ref3">2,3</xref>
        ]. The authors used semirings for the analysis of integrity policies,
cryptographic protocols, and computation of trust levels through trust chains.
Krautsevich et al., [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] applied semirings to analysis of security of process-like
structures for describing web services. In this work, we provide a wider range of
application of semirings for security analysis.
5
      </p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>We used XML credentials to describe basic attacks and proposed inference rules
for composition and selection of the attacks. C-semiring allows us to make the
method independent of what security metric is selected for the evaluation.
Finally, we worked towards an adoption of existed algorithm for reasoning on
transitive trust to the analysis of parametric attacks graphs.</p>
      <p>
        As a future work, we would like, first, to introduce modified algorithm for
the analysis of attack graphs. Second, we would like to extend our approach for
other models of attack graphs, e.g., privileges graph. Moreover, we would like
to implement our method as a software prototype and perform an analysis the
properties of the method, e.g, performance. For the implementation, we plan to
minimally modify the code of algorithm for evaluation of RTML credentials with
semirings developed in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>F.</given-names>
            <surname>Baiardi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Martinelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Ricci</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Telmon</surname>
          </string-name>
          .
          <article-title>Constrained automata: a formal tool for risk assessment and mitigation</article-title>
          .
          <source>Journal of Information Assurance and Security</source>
          ,
          <volume>3</volume>
          :
          <fpage>304</fpage>
          -
          <lpage>312</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>G.</given-names>
            <surname>Bella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bistarelli</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. N.</given-names>
            <surname>Foley</surname>
          </string-name>
          .
          <article-title>Soft constraints for security</article-title>
          .
          <source>In Proceedings of the First International Workshop on Views on Designing Complex Architectures (VODCA '04)</source>
          , volume
          <volume>142</volume>
          of Electronic Notes in Theoretical Computer Science, pages
          <fpage>11</fpage>
          -
          <lpage>29</lpage>
          . Elsevier,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>S.</given-names>
            <surname>Bistarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Martinelli</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Santini</surname>
          </string-name>
          .
          <article-title>A semantic foundation for trust management languages with weights: An application to the rt family</article-title>
          .
          <source>In Proceedings of the 5th international conference on Autonomic and Trusted Computing, ATC '08</source>
          , pages
          <fpage>481</fpage>
          -
          <lpage>495</lpage>
          , Berlin, Heidelberg,
          <year>2008</year>
          . Springer-Verlag.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>S.</given-names>
            <surname>Bistarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Montanari</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Rossi</surname>
          </string-name>
          .
          <article-title>Semiring-based constraint satisfaction and optimization</article-title>
          .
          <source>J. ACM</source>
          ,
          <volume>44</volume>
          (
          <issue>2</issue>
          ):
          <fpage>201</fpage>
          -
          <lpage>236</lpage>
          ,
          <year>March 1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>D.</given-names>
            <surname>Fais</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Colombo</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Lazouski</surname>
          </string-name>
          .
          <article-title>An implementation of role-base trust management extended with weights on mobile devices</article-title>
          .
          <source>In Proceedings of the 4th International Workshop on Security and Trust Management</source>
          , volume
          <volume>244</volume>
          of Electronic Notes in Theoretical Computer Science, pages
          <fpage>53</fpage>
          -
          <lpage>65</lpage>
          . Elsevier,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>S.</given-names>
            <surname>Jha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Sheyner</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Wing</surname>
          </string-name>
          .
          <article-title>Minimization and reliability analyses of attack graphs</article-title>
          .
          <source>Technical Report CMU-CS-02-109</source>
          , Carnegie Mellon University,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>L.</given-names>
            <surname>Krautsevich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Martinelli</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Yautsiukhin</surname>
          </string-name>
          .
          <article-title>Formal approach to security metrics. what does “more secure” mean for you?</article-title>
          <source>In Proceedings of the 1st International Workshop on Measurability of Security in Software Architectures</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>L.</given-names>
            <surname>Krautsevich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Martinelli</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Yautsiukhin</surname>
          </string-name>
          .
          <article-title>Formal analysis of security metrics and risk</article-title>
          .
          <source>In Proceedings of the IFIP Workshop on Information Security Theory and Practice</source>
          , volume
          <volume>6633</volume>
          , pages
          <fpage>304</fpage>
          -
          <lpage>319</lpage>
          .
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>L.</given-names>
            <surname>Krautsevich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Martinelli</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Yautsiukhin</surname>
          </string-name>
          .
          <article-title>A general method for assessment of security in complex services</article-title>
          .
          <source>In Proceedings of 4th European Conference ServiceWave</source>
          . Springer,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>N.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. C.</given-names>
            <surname>Mitchell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Qiu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. H.</given-names>
            <surname>Winsborough</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. E.</given-names>
            <surname>Seamons</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Halcrow</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Jacobson</surname>
          </string-name>
          . Rtml:
          <article-title>A role-based trust-management markup language</article-title>
          .
          <source>Technical report</source>
          , Purdue University,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>F.</given-names>
            <surname>Martinelli</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Petrocchi</surname>
          </string-name>
          .
          <article-title>On relating and integrating two trust management frameworks</article-title>
          .
          <source>In Proceedings of the Second International Workshop on Views on Designing Complex Architectures (VODCA '06)</source>
          , volume
          <volume>168</volume>
          of Electronic Notes in Theoretical Computer Science, pages
          <fpage>191</fpage>
          -
          <lpage>205</lpage>
          . Elsevier,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>S.</given-names>
            <surname>Noel</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Jajodia</surname>
          </string-name>
          .
          <article-title>Managing attack graph complexity through visual hierarchical aggregation</article-title>
          . pages
          <fpage>109</fpage>
          -
          <lpage>118</lpage>
          , New York, NY, USA,
          <year>2004</year>
          . ACM Press.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>R.</given-names>
            <surname>Ortalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Deswarte</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Kaaniche</surname>
          </string-name>
          .
          <article-title>Experimenting with quantitative evaluation tools for monitoring operational security</article-title>
          .
          <volume>25</volume>
          (
          <issue>5</issue>
          ):
          <fpage>633</fpage>
          -
          <lpage>650</lpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>J. Pamula</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Jajodia</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Ammann</surname>
            , and
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Swarup</surname>
          </string-name>
          .
          <article-title>A weakest-adversary security metric for network configuration security analysis</article-title>
          .
          <source>In QoP '06: Proceedings of the 2nd ACM workshop on Quality of protection</source>
          , pages
          <fpage>31</fpage>
          -
          <lpage>38</lpage>
          . ACM Press,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. L.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Islam</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Long</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Singhal</surname>
            , and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Jajodia</surname>
          </string-name>
          .
          <article-title>An attack graph-based probabilistic security metric</article-title>
          .
          <source>In Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security</source>
          , pages
          <fpage>283</fpage>
          -
          <lpage>296</lpage>
          , Berlin, Heidelberg,
          <year>2008</year>
          . Springer-Verlag.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. L.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Noel</surname>
            , and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Jajodia</surname>
          </string-name>
          .
          <article-title>Minimum-cost network hardening using attack graphs</article-title>
          .
          <source>Journal Computer Communications</source>
          ,
          <volume>29</volume>
          (
          <issue>18</issue>
          ):
          <fpage>3812</fpage>
          -
          <lpage>3824</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>