A scalable representation towards attack graph generation

被引:0
|
作者
Bhattacharya, Somak [1 ]
Malhotra, Samresh [1 ]
Ghsoh, S. K. [1 ]
机构
[1] Indian Inst Technol, Kharagpur 721302, W Bengal, India
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In today's large complex organizational network, security administration is a challenging task. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of exploit is called attack path and the set of all possible attack paths form an attack graph. However, the generated attack graphs by various previous approaches become too complicated to visually interpret and comprehend. Hence the proposed approach addresses the scalability issue of the attack graph generation through a generic attack path detection algorithm. This will reduce the generation of redundancy in attack graph, thus facilitating security management of an enterprise network.
引用
收藏
页码:149 / 152
页数:4
相关论文
共 50 条
  • [21] Towards Scalable Compositional Test Generation
    Sun, Tao
    Wang, Zheng
    Pu, Geguang
    Yu, Xiao
    Qiu, Zongyan
    Gu, Bin
    2009 NINTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE (QSIC 2009), 2009, : 353 - +
  • [22] Encoding robust representation for graph generation
    Zou, Dongmian
    Lerman, Gilad
    2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
  • [23] Naggen: a Network Attack Graph GENeration Tool
    Barrere, Martin
    Lupu, Emil C.
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 378 - 379
  • [24] Computer-attack graph generation tool
    Swiler, LP
    Phillips, C
    Ellis, D
    Chakerian, S
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 307 - 321
  • [25] ATTACK GRAPH GENERATION WITH INFUSED FUZZY CLUSTERING
    Misra, Sudip
    Obaidat, Mohammad S.
    Bagchi, Atig
    Bhatt, Ravindara
    Ghosh, Soumalya
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 92 - +
  • [26] A Workflow for Distributed and Resilient Attack Graph Generation
    Palma, Alessandro
    Bonomi, Silvia
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 185 - 187
  • [27] Overview on Attack Graph Generation and Visualization Technology
    Yi, Shengwei
    Peng, Yong
    Xiong, Qi
    Wang, Ting
    Dai, Zhonghua
    Gao, Haihui
    Xu, Junfeng
    Wang, Jiteng
    Xu, Lijuan
    2013 IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2013,
  • [28] Generation and Risk Analysis of Network Attack Graph
    Prasad, Keshav
    Kumar, Santosh
    Negi, Anuradha
    Mahanti, Aniket
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 507 - 516
  • [29] Practical attack graph generation for network defense
    Ingols, Kyle
    Lippmann, Richard
    Piwowarski, Keith
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
  • [30] Reinforcement Learning for Scalable Train Timetable Rescheduling With Graph Representation
    Yue, Peng
    Jin, Yaochu
    Dai, Xuewu
    Feng, Zhenhua
    Cui, Dongliang
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (07) : 6472 - 6485