A New Method to Generate Attack Graphs | |
Xie, Anming ; Chen, Guodong ; Wang, Yonggang ; Chen, Zhong ; Hu, Jianbin | |
2009 | |
关键词 | network security attack graphs host access graph sub-attack graph |
英文摘要 | To address the scalability problem in attack graphs generation, we propose a novel method to generate attack graphs automatically. Our approach constructs a twotier attack graph framework, which includes a host access graph and some sub-attack graphs. A sub-attack graph describes concrete attack scenarios from one source host to one target host, while the host access graph describes the attacker's privilege transition among hosts. Our sub-attack graphs and host access graph have remarkable smaller scales and can help network administrators to find the key hosts in attack sequences. Analysis shows that the upper bound computational cost of our model is O(N(3)), which could also be competed in real time. The following experiment validates our approach.; http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000274878700054&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=8e1609b174ce4e31116a60747a720701 ; Computer Science, Software Engineering; Computer Science, Theory & Methods; Engineering, Electrical & Electronic; EI; CPCI-S(ISTP); 2 |
语种 | 英语 |
DOI标识 | 10.1109/SSIRI.2009.32 |
内容类型 | 其他 |
源URL | [http://ir.pku.edu.cn/handle/20.500.11897/293211] |
专题 | 信息科学技术学院 |
推荐引用方式 GB/T 7714 | Xie, Anming,Chen, Guodong,Wang, Yonggang,et al. A New Method to Generate Attack Graphs. 2009-01-01. |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论