An Intelligent Model for Vulnerability Analysis Using Attack Graph

被引:0
|
作者
Wang Yi [1 ]
Xiao Jinghua [1 ]
机构
[1] WUST, Sch Comp Sci & Technol, Wuhan 430081, Peoples R China
关键词
intelligent; attack graph; vulnerability;
D O I
10.1109/IFITA.2009.436
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Constructing attack graph is an important approach to analyze vulnerabilities. Although automated generating attack graph have been proposed to discover the possible attack graphs efficiently, they still require manual effort and expert knowledge to describe the attack templates before the computerized model checking procedure can be performed Moreover, without considering the configuration changes and attackers' goals in large complicated network, many attack graphs generated may be impractical in real attack. In this paper, we proposed an intelligent model for vulnerability analysis, taking into account of the attackers' goals and configuration information, which automatically generates attack graph's by defining a series of prolog facts and rules.
引用
收藏
页码:526 / 529
页数:4
相关论文
共 50 条
  • [21] A dual graph neural networks model using sequence embedding as graph nodes for vulnerability detection
    Ling, Miaogui
    Tang, Mingwei
    Bian, Deng
    Lv, Shixuan
    Tang, Qi
    [J]. Information and Software Technology, 2025, 177
  • [22] A survivability quantitative analysis model for network system based on attack graph
    Zhang, Le-Jun
    Wang, Wei
    Guo, Lin
    Yang, Wu
    Yang, Yong-Tian
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3211 - 3216
  • [23] Network intrusion intention analysis model based on Bayesian attack graph
    Luo Z.
    Yang X.
    Liu J.
    Xu R.
    [J]. 1600, Editorial Board of Journal on Communications (41): : 160 - 169
  • [24] An intelligent model for mitigating the attack effects
    Sobh, TS
    Hamed, EM
    [J]. ICEEC'04: 2004 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTER ENGINEERING, PROCEEDINGS, 2004, : 165 - 168
  • [25] Attack Model for Generic Intelligent Systems
    Boonkrong, Sirapat
    [J]. JOURNAL OF APPLIED SECURITY RESEARCH, 2023,
  • [26] Network Security Node-Edge Scoring System Using Attack Graph Based on Vulnerability Correlation
    Shin, Gun-Yoon
    Hong, Sung-Sam
    Lee, Jung-Sik
    Han, In-Sung
    Kim, Hwa-Kyung
    Oh, Haeng-Rok
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (14):
  • [27] Vulnerability association evaluation of Internet of thing devices based on attack graph
    Ma, Yao
    Wu, Yuting
    Yu, Dan
    Ding, Lv
    Chen, Yongle
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (05):
  • [28] NETWORK ATTACK PATH PREDICTION BASED ON VULNERABILITY DATA AND KNOWLEDGE GRAPH
    Wang, Yifan
    Sun, Zhi
    Han, Ye
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2021, 17 (05): : 1717 - 1730
  • [29] An adversarial model for attack vector vulnerability analysis on power and gas delivery operations
    Carreno, Ignacio Losada
    Scaglione, Anna
    Zlotnik, Anatoly
    Deka, Deepjyoti
    Sundar, Kaarthik
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2020, 189
  • [30] Research on SQL Injection Vulnerability Attack model
    Su, Guanyu
    Wang, Fang
    Li, Qi
    [J]. PROCEEDINGS OF 2018 5TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2018, : 217 - 221