An Intelligent Model for Vulnerability Analysis Using Attack Graph

被引:0
|
作者
Wang Yi [1 ]
Xiao Jinghua [1 ]
机构
[1] WUST, Sch Comp Sci & Technol, Wuhan 430081, Peoples R China
关键词
intelligent; attack graph; vulnerability;
D O I
10.1109/IFITA.2009.436
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Constructing attack graph is an important approach to analyze vulnerabilities. Although automated generating attack graph have been proposed to discover the possible attack graphs efficiently, they still require manual effort and expert knowledge to describe the attack templates before the computerized model checking procedure can be performed Moreover, without considering the configuration changes and attackers' goals in large complicated network, many attack graphs generated may be impractical in real attack. In this paper, we proposed an intelligent model for vulnerability analysis, taking into account of the attackers' goals and configuration information, which automatically generates attack graph's by defining a series of prolog facts and rules.
引用
收藏
页码:526 / 529
页数:4
相关论文
共 50 条
  • [1] Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks
    Bhardwaj, Sonam
    Dave, Mayank
    [J]. TELECOMMUNICATION SYSTEMS, 2024, 85 (04) : 601 - 621
  • [2] Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks
    Sonam Bhardwaj
    Mayank Dave
    [J]. Telecommunication Systems, 2024, 85 : 601 - 621
  • [3] Network Vulnerability Analysis Using a Constrained Graph Data Model
    Barik, Mridul Sankar
    Mazumdar, Chandan
    Gupta, Amarnath
    [J]. INFORMATION SYSTEMS SECURITY, 2016, 10063 : 263 - 282
  • [4] A Protocol Vulnerability Analysis Method Based on Logical Attack Graph
    Zhang, Chunrui
    Wang, Shen
    Zhan, Dechen
    [J]. ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 309 - 317
  • [5] Using vulnerability analysis to model attack scenario for collaborative intrusion detection
    Liu, Xuejiao
    Xiao, Debao
    [J]. 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1273 - 1277
  • [6] Propose Vulnerability Metrics to Measure Network Secure using Attack Graph
    Al-Araji, Zaid J.
    Ahmad, Sharifah Sakinah Syed
    Abdullah, Raihana Syahirah
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 51 - 58
  • [7] AGQL: A Query Language for Attack Graph based Network Vulnerability Analysis
    Barik, Mridul Sankar
    [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [8] IoT System Vulnerability Analysis and Network Hardening with Shortest Attack Trace in aWeighted Attack Graph
    Wan, Yinxin
    Lin, Xuanli
    Sabur, Abdulhakim
    Chang, Alena
    Xu, Kuai
    Xue, Guoliang
    [J]. PROCEEDINGS 8TH ACM/IEEE CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION, IOTDI 2023, 2023, : 315 - 326
  • [9] Network Vulnerability Assessment based on Attack Graph
    Wang Huan
    Zhao Jianping
    Liu Dan
    Li Bo
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 542 - 545
  • [10] An Intelligent Model for Vulnerability Analysis of Social Media User
    Abubaker, Firya Rashid
    Boluk, Pinar Sarisaray
    [J]. 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 258 - 263