Computer-attack graph generation tool

被引:0
|
作者
Swiler, LP [1 ]
Phillips, C [1 ]
Ellis, D [1 ]
Chakerian, S [1 ]
机构
[1] Sandia Natl Labs, Albuquerque, NM 87185 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a tool for assessment of security attributes and vulnerabilities in computer networks. The tool generates attack graphs[10]. Each node in the attack graph represents a possible attack state. Edges represent a change of state caused by a single action taken by the attacker or unwitting assistant, and are weighted by some metric (such as attacker effort or time to succeed). Generation of the attack graph requires algorithms that match information about attack requirements (specified in attack templates) to information about the network configuration and assumed attacker capabilities (attacker profile). The set of near-optimal shortest paths indicates the most exploitable components of the system configuration. This paper presents the status of the tool and discusses implementation issues, especially focusing on the data input needs and methods for eliminating redundant paths and nodes in the graph.(1).
引用
收藏
页码:307 / 321
页数:15
相关论文
共 50 条
  • [1] Naggen: a Network Attack Graph GENeration Tool
    Barrere, Martin
    Lupu, Emil C.
    [J]. 2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 378 - 379
  • [2] Distributed Attack Graph Generation
    Kaynar, Kerem
    Sivrikaya, Fikret
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 519 - 532
  • [3] Research on computer network attack modeling based on attack graph
    Wang, Guo-Yu
    Wang, Hui-Mei
    Chen, Zhi-Jie
    Xian, Ming
    [J]. Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (04): : 74 - 80
  • [4] Concurrency Strategies for Attack Graph Generation
    Li, Ming
    Hawrylak, Peter J.
    Hale, John
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019), 2019, : 174 - 179
  • [5] Attack Graph Generation and Analysis Techniques
    Barik, Mridul Sankar
    Sengupta, Anirban
    Mazumdar, Chandan
    [J]. DEFENCE SCIENCE JOURNAL, 2016, 66 (06) : 559 - 567
  • [6] A method for global attack graph generation
    Man, Dapeng
    Zhang, Bing
    Yang, Wu
    Jin, Wenjin
    Yang, Yongtian
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 236 - +
  • [7] Attack Graph Generation for Microservice Architecture
    Ibrahim, Amjad
    Bozhinoski, Stevica
    Pretschner, Alexander
    [J]. SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 1235 - 1242
  • [8] TAG: Topological Attack Graph Analysis Tool
    Malowidzki, Marek
    Hermanowski, Damian
    Berezinski, Przemyslaw
    [J]. 2019 3RD CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2019,
  • [9] ATTACK GRAPH GENERATION WITH INFUSED FUZZY CLUSTERING
    Misra, Sudip
    Obaidat, Mohammad S.
    Bagchi, Atig
    Bhatt, Ravindara
    Ghosh, Soumalya
    [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 92 - +
  • [10] A scalable representation towards attack graph generation
    Bhattacharya, Somak
    Malhotra, Samresh
    Ghsoh, S. K.
    [J]. PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 149 - 152