Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation

被引:0
|
作者
Chen, Junhan [1 ,3 ]
Liang, Rufeng [1 ,3 ]
Zhang, Man [2 ]
Zheng, Chengcong [1 ,3 ]
Huang, Xun [1 ,3 ]
Lu, Hui [1 ]
Yu, Xiang [4 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
[2] Peng Cheng Lab, Shenzhen, Peoples R China
[3] Pazhou Lab, Guangzhou, Peoples R China
[4] Taizhou Univ, Sch Elect & Informat Engn, Taizhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Exploit Chain; Multi-step Attack; Vulnerability Correlation; Breach and Attack Simulation; Penetration Testing;
D O I
10.1109/CloudNet59005.2023.10490046
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As networks continue to expand in scale and complexity, the frequency and severity of network attacks are rapidly increasing. Regular penetration testing is essential to enhance cybersecurity defense. However, manual testing lacks the intelligence necessary for effective assessments. Breach and Attack Simulation (BAS) represents an advanced penetration method for automated evaluation of security situations. Current methodologies primarily focus on individual vulnerabilities or attack behaviors, which exhibit weaknesses in correlation and granularity, and do not adapt well to real-world scenarios. To improve the accuracy and efficacy of BAS, it is imperative to integrate vulnerability correlation, multi-step attacks, and exploit chains. The paper is divided into three sections, providing a comprehensive exposition on vulnerability association. It summarizes the implementation principles of various methods and offers recommendations concerning current research advancements and future research directions.
引用
收藏
页码:398 / 402
页数:5
相关论文
共 50 条
  • [1] A Privacy-Preserving Multi-step Attack Correlation Algorithm
    Xian, Minyi
    Zhang, Yongtang
    [J]. PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 1389 - 1393
  • [2] MAAC: Novel Alert Correlation Method To Detect Multi-step Attack
    Wang, Xiaoyu
    Gong, Xiaorui
    Yu, Lei
    Liu, Jian
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 726 - 733
  • [3] Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling
    Liu, Zhijie
    Wang, Chongjun
    Chen, Shifu
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 214 - +
  • [4] Privacy-preserving sequential step mining algorithm for multi-step attack correlation
    Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, School of Information Security Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    不详
    不详
    [J]. Qinghua Daxue Xuebao, 10 (1427-1434):
  • [5] A systematic survey on multi-step attack detection
    Navarro, Julio
    Deruyver, Aline
    Parrend, Pierre
    [J]. COMPUTERS & SECURITY, 2018, 76 : 214 - 249
  • [6] A multi-step attack identification and correlation method based on multi-information fusion
    Liao, Niandong
    Wang, Jiaxun
    Guan, Jiayu
    Fan, Hejun
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2024, 117
  • [7] An Attack Graph-based On-line Multi-step Attack Detector
    Angelini, Marco
    Bonomi, Silvia
    Borzi, Emanuele
    Del Pozzo, Antonella
    Lenti, Simone
    Santucci, Giuseppe
    [J]. ICDCN'18: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2018,
  • [8] Detection algorithm for multi-step attack based on CTPN
    Yan, Fen
    Huang, Hao
    Yin, Xin-Chun
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1383 - 1391
  • [9] MAD: A Middleware Framework for Multi-Step Attack Detection
    Papadopoulos, Panagiotis
    Petsas, Thanasis
    Christou, Giorgos
    Vasiliadis, Giorgos
    [J]. 2015 4TH INTERNATIONAL WORKSHOP ON BUILDING ANALYSIS DATASETS AND GATHERING EXPERIENCE RETURNS FOR SECURITY (BADGERS), 2015, : 8 - 15
  • [10] A heuristic multi-step attack model generation method based on kill chain model
    Liu, Jianyi
    Lu, Chen
    Lin, Bingjie
    Guo, Han
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2021, 128 : 36 - 37