A scalable representation towards attack graph generation

被引:0
|
作者
Bhattacharya, Somak [1 ]
Malhotra, Samresh [1 ]
Ghsoh, S. K. [1 ]
机构
[1] Indian Inst Technol, Kharagpur 721302, W Bengal, India
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In today's large complex organizational network, security administration is a challenging task. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of exploit is called attack path and the set of all possible attack paths form an attack graph. However, the generated attack graphs by various previous approaches become too complicated to visually interpret and comprehend. Hence the proposed approach addresses the scalability issue of the attack graph generation through a generic attack path detection algorithm. This will reduce the generation of redundancy in attack graph, thus facilitating security management of an enterprise network.
引用
收藏
页码:149 / 152
页数:4
相关论文
共 50 条
  • [41] A Generation Method of Attack Graph Based on Evolutionary Computation
    Wang, Jiajia
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ENERGY, ENVIRONMENT AND CHEMICAL ENGINEERING (AEECE 2016), 2016, 89 : 28 - 31
  • [42] Attack Graph Generation with Machine Learning for Network Security
    Koo, Kijong
    Moon, Daesung
    Huh, Jun-Ho
    Jung, Se-Hoon
    Lee, Hansung
    ELECTRONICS, 2022, 11 (09)
  • [43] A taxonomy for attack graph generation and usage in network securitya
    Kaynar, Kerem
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 29 : 27 - 56
  • [44] Depth-first method for attack graph generation
    Information Security Research Center, Harbin Engineering University, Harbin 150001, China
    不详
    Jilin Daxue Xuebao (Gongxueban), 2009, 2 (446-452):
  • [45] Identifying Interdependencies Using Attack Graph Generation Methods
    Lever, Kirsty E.
    Kifayat, Kashif
    Merabti, Madjid
    2015 11TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2015, : 80 - 85
  • [46] Research on attack graph generation for network security situation
    Wang, Yanbo
    Wang, Huiqiang
    Zhao, Chao
    Zhang, Yushu
    Yu, Ming
    Advances in Intelligent Systems and Computing, 2013, 212 : 1147 - 1154
  • [47] An Attack Graph Generation Method Based on Parallel Computing
    Cao, Ningyuan
    Lv, Kun
    Hu, Changzhen
    SCIENCE OF CYBER SECURITY, SCISEC 2018, 2018, 11287 : 34 - 48
  • [48] Attack Graph Generation and Visualization for Industrial Control Network
    Feng, Yanli
    Sun, Gongliang
    Liu, Zhiyao
    Wu, Chenrui
    Zhu, Xiaoyang
    Wang, Zibo
    Wang, Bailing
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7655 - 7660
  • [49] Scalable Graph Representation Learning via Locality-Sensitive Hashing
    Chen, Xiusi
    Jiang, Jyun-Yu
    Wang, Wei
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022, 2022, : 3878 - 3882
  • [50] Towards Scalable Distributed Graph Database Engine for Hybrid Clouds
    Dayarathna, Miyuru
    Suzumura, Toyotaro
    2014 5TH INTERNATIONAL WORKSHOP ON DATA-INTENSIVE COMPUTING IN THE CLOUDS (DATACLOUD), 2014, : 1 - 8