Computer-attack graph generation tool

被引:0
|
作者
Swiler, LP [1 ]
Phillips, C [1 ]
Ellis, D [1 ]
Chakerian, S [1 ]
机构
[1] Sandia Natl Labs, Albuquerque, NM 87185 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a tool for assessment of security attributes and vulnerabilities in computer networks. The tool generates attack graphs[10]. Each node in the attack graph represents a possible attack state. Edges represent a change of state caused by a single action taken by the attacker or unwitting assistant, and are weighted by some metric (such as attacker effort or time to succeed). Generation of the attack graph requires algorithms that match information about attack requirements (specified in attack templates) to information about the network configuration and assumed attacker capabilities (attacker profile). The set of near-optimal shortest paths indicates the most exploitable components of the system configuration. This paper presents the status of the tool and discusses implementation issues, especially focusing on the data input needs and methods for eliminating redundant paths and nodes in the graph.(1).
引用
收藏
页码:307 / 321
页数:15
相关论文
共 50 条
  • [21] A Tool for Exploring Networks of Computer Scientists as a Graph
    Cesarini, Mirko
    Mercorio, Fabio
    Mezzanzanica, Mario
    Moscato, Vincenzo
    Picariello, Antonio
    [J]. SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 2240 - 2242
  • [22] Research on attack graph generation for network security situation
    College of Computer Science and Technology Harbin Engineering University, Harbin, China
    不详
    [J]. Adv. Intell. Sys. Comput., (1147-1154):
  • [23] Identifying Interdependencies Using Attack Graph Generation Methods
    Lever, Kirsty E.
    Kifayat, Kashif
    Merabti, Madjid
    [J]. 2015 11TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2015, : 80 - 85
  • [24] Attack Graph Generation and Visualization for Industrial Control Network
    Feng, Yanli
    Sun, Gongliang
    Liu, Zhiyao
    Wu, Chenrui
    Zhu, Xiaoyang
    Wang, Zibo
    Wang, Bailing
    [J]. PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7655 - 7660
  • [25] An Attack Graph Generation Method Based on Parallel Computing
    Cao, Ningyuan
    Lv, Kun
    Hu, Changzhen
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2018, 2018, 11287 : 34 - 48
  • [26] A taxonomy for attack graph generation and usage in network securitya
    Kaynar, Kerem
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 29 : 27 - 56
  • [27] Attack Graph Generation with Machine Learning for Network Security
    Koo, Kijong
    Moon, Daesung
    Huh, Jun-Ho
    Jung, Se-Hoon
    Lee, Hansung
    [J]. ELECTRONICS, 2022, 11 (09)
  • [28] An Attack Graph Based Metric for Security Evaluation of Computer Networks
    Keramati, Marjan
    Akbari, Ahmad
    [J]. 2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1094 - 1098
  • [29] GARNET: A Graphical Attack graph and Reachability Network Evaluation Tool
    Williams, Leevar
    Lippmann, Richard
    Ingols, Kyle
    [J]. VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 44 - 59
  • [30] A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks
    Al Ghazo, Alaa T.
    Ibrahim, Mariam
    Ren, Hao
    Kumar, Ratnesh
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2020, 50 (10): : 3488 - 3498