Study on the method to generate network attack graphs

被引:0
|
作者
Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China [1 ]
机构
来源
Gaojishu Tongxin | 2006年 / 4卷 / 348-352期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Aiming at the requirement of network security analysis, a flexible method to generate attack graph is presented. After analyzing network security attributes including the host, user privilege, connection relation, etc., the network security model is built, and the model could describe the network security status. A forward-search, breadth-first algorithm is used to produce attack route, and the tools Graphviz isutilized to generate the attack graph. The experimental rersults validate that our method is feasible.
引用
收藏
相关论文
共 50 条
  • [21] Measuring the overall security of network configurations using attack graphs
    Wang, Lingyu
    Singhal, Anoop
    Jajodia, Sushil
    DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 98 - +
  • [22] Motif-Based Attack Detection in Network Communication Graphs
    Juszczyszyn, Krzysztof
    Kolaczek, Grzegorz
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 206 - 213
  • [23] Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
    Ingols, Kyle
    Chu, Matthew
    Lippmann, Richard
    Webster, Seth
    Boyer, Stephen
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 117 - 126
  • [24] Study on Evaluation Method for Network Survivability Under Intentional Nodes Attack
    Shen, Jianjun
    Li, Kai
    MECHANICAL, CONTROL, ELECTRIC, MECHATRONICS, INFORMATION AND COMPUTER, 2016, : 102 - 108
  • [25] An effective recognition method for network attack
    Liu, Ying
    Gu, Wen-Xiang
    OPTIK, 2013, 124 (21): : 4823 - 4826
  • [26] A network attack path prediction method using attack graph
    Liu, Xuguang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020,
  • [27] How to Attack and Generate Honeywords
    Wang, Ding
    Zou, Yunkai
    Dong, Qiying
    Song, Yuanming
    Huang, Xinyi
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 966 - 983
  • [28] An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets
    Xie, Huihui
    Lv, Kun
    Hu, Changzhen
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1777 - 1784
  • [29] Augmenting Attack Graphs to Represent Data Link and Network Layer Vulnerabilities
    Acosta, Jaime C.
    Padilla, Edgar
    Homer, John
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 1010 - 1015
  • [30] Two Scalable Analyses of Compact Attack Graphs for Defending Network Security
    Chen, Feng
    Tu, Ri
    Zhang, Yi
    Su, Jinshu
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 627 - 632