A comprehensive approach to enterprise network security management

dc.contributor.authorHomer, John
dc.date.accessioned2009-05-05T15:32:45Z
dc.date.available2009-05-05T15:32:45Z
dc.date.graduationmonthMayen
dc.date.issued2009-05-05T15:32:45Z
dc.date.published2009en
dc.description.abstractEnterprise network security management is a vitally important task, more so now than ever before. Networks grow ever larger and more complex, and corporations, universities, government agencies, etc. rely heavily on the availability of these networks. Security in enterprise networks is constantly threatened by thousands of known software vulnerabilities, with thousands more discovered annually in a wide variety of applications. An overwhelming amount of data is relevant to the ongoing protection of an enterprise network. Previous works have addressed the identification of vulnerabilities in a given network and the aggregated collection of these vulnerabilities in an attack graph, clearly showing how an attacker might gain access to or control over network resources. These works, however, do little to address how to evaluate or properly utilize this information. I have developed a comprehensive approach to enterprise network security management. Compared with previous methods, my approach realizes these issues as a uniform desire for provable mitigation of risk within an enterprise network. Attack graph simplification is used to improve user comprehension of the graph data and to enable more efficient use of the data in risk assessment. A sound and effective quantification of risk within the network produces values that can form a basis for valuation policies necessary for the application of a SAT solving technique. SAT solving resolves policy conflicts and produces an optimal reconfiguration, based on the provided values, which can be verified by a knowledgeable human user for accuracy and applicability within the context of the enterprise network. Empirical study shows the effectiveness and efficiency of these approaches, and also indicates promising directions for improvements to be explored in future works. Overall, this research comprises an important step toward a more automated security management initiative.en
dc.description.advisorXinming (Simon) Ouen
dc.description.degreeDoctor of Philosophyen
dc.description.departmentDepartment of Computing and Information Sciencesen
dc.description.levelDoctoralen
dc.identifier.urihttp://hdl.handle.net/2097/1372
dc.language.isoen_USen
dc.publisherKansas State Universityen
dc.subjectEnterprise network security analysisen
dc.subjectRisk assessmenten
dc.subjectAttack Graphen
dc.subjectEnterprise network configuration managementen
dc.subjectSecurity metricen
dc.subject.umiComputer Science (0984)en
dc.titleA comprehensive approach to enterprise network security managementen
dc.typeDissertationen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
JohnHomer2009.pdf
Size:
997.04 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.69 KB
Format:
Item-specific license agreed upon to submission
Description: