A scalable representation towards attack graph generation

被引:0
|
作者
Bhattacharya, Somak [1 ]
Malhotra, Samresh [1 ]
Ghsoh, S. K. [1 ]
机构
[1] Indian Inst Technol, Kharagpur 721302, W Bengal, India
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In today's large complex organizational network, security administration is a challenging task. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of exploit is called attack path and the set of all possible attack paths form an attack graph. However, the generated attack graphs by various previous approaches become too complicated to visually interpret and comprehend. Hence the proposed approach addresses the scalability issue of the attack graph generation through a generic attack path detection algorithm. This will reduce the generation of redundancy in attack graph, thus facilitating security management of an enterprise network.
引用
收藏
页码:149 / 152
页数:4
相关论文
共 50 条
  • [1] Compressed graph representation for scalable molecular graph generation
    Kwon, Youngchun
    Lee, Dongseon
    Choi, Youn-Suk
    Shin, Kyoham
    Kang, Seokho
    JOURNAL OF CHEMINFORMATICS, 2020, 12 (01)
  • [2] Compressed graph representation for scalable molecular graph generation
    Youngchun Kwon
    Dongseon Lee
    Youn-Suk Choi
    Kyoham Shin
    Seokho Kang
    Journal of Cheminformatics, 12
  • [3] Towards Automated Generation and Visualization of Hierarchical Attack Representation Models
    Jia, Fangcheng
    Hong, Jin B.
    Kim, Dong Seong
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1690 - 1697
  • [4] It is Time To Steer: A Scalable Framework for Analysis-Driven Attack Graph Generation
    Palma, Alessandro
    Angelini, Marco
    COMPUTER SECURITY-ESORICS 2024, PT IV, 2024, 14985 : 229 - 250
  • [5] Scalable Attack Graph for Risk Assessment
    Lee, Jehyun
    Lee, Heejo
    In, Hoh Peter
    ICOIN: 2009 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 2009, : 78 - 82
  • [6] Scalable Attack on Graph Data by Important Nodes
    Hu, Wenjiang
    Ma, Mingda
    Jiang, Yanan
    Xia, Hui
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT IV, KSEM 2024, 2024, 14887 : 176 - 188
  • [7] Performance Analysis of Scalable Attack Representation Models
    Hong, Jin B.
    Kim, Dong Seong
    SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 330 - 343
  • [8] Distributed Attack Graph Generation
    Kaynar, Kerem
    Sivrikaya, Fikret
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 519 - 532
  • [9] Scalable attack on graph data by injecting vicious nodes
    Jihong Wang
    Minnan Luo
    Fnu Suya
    Jundong Li
    Zijiang Yang
    Qinghua Zheng
    Data Mining and Knowledge Discovery, 2020, 34 : 1363 - 1389
  • [10] Scalable attack on graph data by injecting vicious nodes
    Wang, Jihong
    Luo, Minnan
    Suya, Fnu
    Li, Jundong
    Yang, Zijiang
    Zheng, Qinghua
    DATA MINING AND KNOWLEDGE DISCOVERY, 2020, 34 (05) : 1363 - 1389