A scalable representation towards attack graph generation

被引:0
|
作者
Bhattacharya, Somak [1 ]
Malhotra, Samresh [1 ]
Ghsoh, S. K. [1 ]
机构
[1] Indian Inst Technol, Kharagpur 721302, W Bengal, India
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In today's large complex organizational network, security administration is a challenging task. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of exploit is called attack path and the set of all possible attack paths form an attack graph. However, the generated attack graphs by various previous approaches become too complicated to visually interpret and comprehend. Hence the proposed approach addresses the scalability issue of the attack graph generation through a generic attack path detection algorithm. This will reduce the generation of redundancy in attack graph, thus facilitating security management of an enterprise network.
引用
收藏
页码:149 / 152
页数:4
相关论文
共 50 条
  • [31] Scalable force-directed graph representation learning and visualization
    Rahman, Md Khaledur
    Sujon, Majedul Haque
    Azad, Ariful
    KNOWLEDGE AND INFORMATION SYSTEMS, 2022, 64 (01) : 207 - 233
  • [32] Scalable and Effective Temporal Graph Representation Learning With Hyperbolic Geometry
    Xu, Yuanyuan
    Zhang, Wenjie
    Xu, Xiwei
    Li, Binghao
    Zhang, Ying
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, : 1 - 15
  • [33] Scalable force-directed graph representation learning and visualization
    Md. Khaledur Rahman
    Majedul Haque Sujon
    Ariful Azad
    Knowledge and Information Systems, 2022, 64 : 207 - 233
  • [34] Sub-graph Contrast for Scalable Self-Supervised Graph Representation Learning
    Jiao, Yizhu
    Xiong, Yun
    Zhang, Jiawei
    Zhang, Yao
    Zhang, Tianqi
    Zhu, Yangyong
    20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2020), 2020, : 222 - 231
  • [35] Towards a Scalable, Pragmatic Knowledge Representation Language for the Web
    Fischer, Florian
    Unel, Gulay
    Bishop, Barry
    Fensel, Dieter
    PERSPECTIVES OF SYSTEMS INFORMATICS, 2010, 5947 : 124 - 134
  • [36] Towards Unifying Vulnerability Information for Attack Graph Construction
    Roschke, Sebastian
    Cheng, Feng
    Schuppenies, Robert
    Meinel, Christoph
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 218 - 233
  • [37] Internet attack representation using a hierarchical state transition graph
    Lee, CW
    Im, EG
    Kim, DK
    INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, 2003, : 219 - 228
  • [38] An Attack Path Generation Methods Based on Graph Database
    Yuan, Bintao
    Pan, Zulie
    Shi, Fan
    Li, Zhenhan
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1905 - 1910
  • [39] Attack Graph Generation, Visualization and Analysis: Issues and Challenges
    Bopche, Ghanshyam S.
    Mehtre, Babu M.
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 379 - 390
  • [40] Strategies for Practical Hybrid Attack Graph Generation and Analysis
    Li, Ming
    Hawrylak, Peter
    Hale, John
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (04):