An Intelligent Model for Vulnerability Analysis Using Attack Graph

被引:0
|
作者
Wang Yi [1 ]
Xiao Jinghua [1 ]
机构
[1] WUST, Sch Comp Sci & Technol, Wuhan 430081, Peoples R China
关键词
intelligent; attack graph; vulnerability;
D O I
10.1109/IFITA.2009.436
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Constructing attack graph is an important approach to analyze vulnerabilities. Although automated generating attack graph have been proposed to discover the possible attack graphs efficiently, they still require manual effort and expert knowledge to describe the attack templates before the computerized model checking procedure can be performed Moreover, without considering the configuration changes and attackers' goals in large complicated network, many attack graphs generated may be impractical in real attack. In this paper, we proposed an intelligent model for vulnerability analysis, taking into account of the attackers' goals and configuration information, which automatically generates attack graph's by defining a series of prolog facts and rules.
引用
收藏
页码:526 / 529
页数:4
相关论文
共 50 条
  • [41] PROBABILITY ANALYSIS OF THERMAL VULNERABILITY TO NUCLEAR ATTACK
    TRILLING, C
    [J]. OPERATIONS RESEARCH, 1957, 5 (01) : 146 - 147
  • [42] A Game Theoretical Vulnerability Analysis of Adversarial Attack
    Hossain, Khondker Fariha
    Tavakkoli, Alireza
    Sengupta, Shamik
    [J]. ADVANCES IN VISUAL COMPUTING, ISVC 2022, PT II, 2022, 13599 : 369 - 380
  • [43] Attack and Analysis on The Vulnerability of Tenda Wireless Routers
    Zhang, Yipeng
    Jiang, Zhengtao
    Yang, Chen
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5316 - +
  • [44] RecGraph: Graph Recovery Attack using Variational Graph Autoencoders
    Tian, Jing
    Liu, Chang
    Gou, Gaopeng
    Li, Zhen
    Xiong, Gang
    Guan, Yangyang
    [J]. 2021 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE (IPCCC), 2021,
  • [45] Cybersecurity: A Survey of Vulnerability Analysis and Attack Graphs
    Lahcen, Rachid Ait Maalem
    Mohapatra, Ram
    Kumar, Manish
    [J]. MATHEMATICS AND COMPUTING (ICMC 2018), 2018, 253 : 97 - 111
  • [46] The Optimized Attribute Attack Graph Based on APT Attack Stage Model
    Li, Meicong
    Huang, Wei
    Wang, Yongbin
    Fan, Wenqing
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 2781 - 2785
  • [47] Quantitative assessment for the vulnerability of cyber-physical system based on attack graph
    Huang, Jiahui
    Feng, Dongqin
    [J]. International Journal of Electrical Engineering, 2015, 22 (06): : 201 - 207
  • [48] Intelligent model for cyber attack detection and prevention
    Hentea, M
    [J]. PROCEEDINGS OF THE ISCA 12TH INTERNATIONAL CONFERENCE INTELLIGENT AND ADAPTIVE SYSTEMS AND SOFTWARE ENGINEERING, 2003, : 5 - 10
  • [49] Model Inversion Attack with Least Information and an In-depth Analysis of its Disparate Vulnerability
    Dibbo, Sayanton V.
    Chung, Dae Lim
    Mehnaz, Shagufta
    [J]. 2023 IEEE CONFERENCE ON SECURE AND TRUSTWORTHY MACHINE LEARNING, SATML, 2023, : 119 - 135
  • [50] PAGCL: An unsupervised graph poisoned attack for graph contrastive learning model
    Li, Qing
    Wang, Ziyue
    Li, Zehao
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 149 : 240 - 249