CORC  > 北京大学  > 信息科学技术学院
A New Method to Generate Attack Graphs
Xie, Anming ; Chen, Guodong ; Wang, Yonggang ; Chen, Zhong ; Hu, Jianbin
2009
关键词network security attack graphs host access graph sub-attack graph
英文摘要To address the scalability problem in attack graphs generation, we propose a novel method to generate attack graphs automatically. Our approach constructs a twotier attack graph framework, which includes a host access graph and some sub-attack graphs. A sub-attack graph describes concrete attack scenarios from one source host to one target host, while the host access graph describes the attacker's privilege transition among hosts. Our sub-attack graphs and host access graph have remarkable smaller scales and can help network administrators to find the key hosts in attack sequences. Analysis shows that the upper bound computational cost of our model is O(N(3)), which could also be competed in real time. The following experiment validates our approach.; http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000274878700054&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=8e1609b174ce4e31116a60747a720701 ; Computer Science, Software Engineering; Computer Science, Theory & Methods; Engineering, Electrical & Electronic; EI; CPCI-S(ISTP); 2
语种英语
DOI标识10.1109/SSIRI.2009.32
内容类型其他
源URL[http://ir.pku.edu.cn/handle/20.500.11897/293211]  
专题信息科学技术学院
推荐引用方式
GB/T 7714
Xie, Anming,Chen, Guodong,Wang, Yonggang,et al. A New Method to Generate Attack Graphs. 2009-01-01.
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace