SHARE
Facebook X Pinterest WhatsApp

Create an Attack Graph to Find System Vulnerabilities

After a system has been exploited, IT security staff may attempt to recreate the attack to help determine exactly where the vulnerabilities were located. Some IT organizations may even try to lay out their system configurations to determine whether any issues or potential attack areas exist. To do this can be challenging, since there are […]

Written By
thumbnail
Kim Mays
Kim Mays
Sep 24, 2013

After a system has been exploited, IT security staff may attempt to recreate the attack to help determine exactly where the vulnerabilities were located. Some IT organizations may even try to lay out their system configurations to determine whether any issues or potential attack areas exist. To do this can be challenging, since there are so many components and paths where an attack could take place.

Determining attack paths after or prior to an actual intrusion involves using forensic examination techniques. One such approach involves drawing out a graphical representation of potential exploits.

To help you understand and use such techniques, read our IT Download, “Using Attack Graphs in Forensic Examinations.” In this document, the authors explain in detail how to develop attack graphs to examine possible vulnerabilities in your systems. According to the publication:

Independently, attack graphs specify preconditions and post conditions of each act that can be used to create an attack. Combining them in a directed graph where the preconditions of a step are enabled by the post conditions of prior executed steps, it would create an attack. Therefore, given a set of vulnerabilities in a system, an attack graph analysis provides investigators with potential attack scenarios. Finding evidence that matches one or many such paths would then facilitate re-creating the attack.

In the download, the authors describe how to use an attack graph to find forensic evidence after a cyberattack. The paper also tells how hackers can use anti-forensic activity to “clean up evidence left behind by an attack.” The authors also discuss the National Vulnerability Database (NVD) and its role in assisting with forensic investigations even if anti-forensics tools were implemented in the attack.

This educational download can help enterprise IT security staff learn more about their own network vulnerabilities. It may even help mitigate damage from an attack, find evidence from an intrusion or show possible open issues with current network setups.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.