Practical attack graph generation for network defense

被引:187
|
作者
Ingols, Kyle [1 ]
Lippmann, Richard [1 ]
Piwowarski, Keith [1 ]
机构
[1] MIT, Lincoln Lab, 244 Wood St, Lexington, MA 02420 USA
关键词
D O I
10.1109/ACSAC.2006.39
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patching the vulnerabilities and configuration errors that allow the attackers the greatest amount of access. We have created a new type of attack graph, the multiple-prerequisite graph, that scales nearly linearly as the size of a typical network increases. We have built a prototype system using this graph type. ne prototype uses readily available source data to automatically compute network reachability, classify vulnerabilities, build the graph, and recommend actions to improve network security. We have tested the prototype on an operational network with over 250 hosts, where it helped to discover a previously unknown configuration error It has processed complex simulated networks with over 50,000 hosts in under four minutes.
引用
收藏
页码:121 / +
页数:2
相关论文
共 50 条
  • [1] State Grid Network Attack-defense Graph Generation Method
    Zhou, Cheng
    Fei, Jia-xuan
    [J]. COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 389 - 398
  • [2] Case Studies of Network Defense with Attack Graph Games
    Durkota, Karel
    Lisy, Viliam
    Kiekintveld, Christopher
    Bosansky, Branislav
    Pechoucek, Michal
    [J]. IEEE INTELLIGENT SYSTEMS, 2016, 31 (05) : 24 - 30
  • [3] Strategies for Practical Hybrid Attack Graph Generation and Analysis
    Li, Ming
    Hawrylak, Peter
    Hale, John
    [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (04):
  • [4] Naggen: a Network Attack Graph GENeration Tool
    Barrere, Martin
    Lupu, Emil C.
    [J]. 2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 378 - 379
  • [5] Generation and Risk Analysis of Network Attack Graph
    Prasad, Keshav
    Kumar, Santosh
    Negi, Anuradha
    Mahanti, Aniket
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 507 - 516
  • [6] Design Procedure of Knowledge Base for Practical Attack Graph Generation
    Inokuchi, Masaki
    Ohta, Yoshinobu
    Kinoshita, Shunichi
    Yagyu, Tomohiko
    Stan, Orly
    Bitton, Ron
    Elovici, Yuval
    Shabtai, Asaf
    [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 594 - 601
  • [7] Attack Graph Generation and Visualization for Industrial Control Network
    Feng, Yanli
    Sun, Gongliang
    Liu, Zhiyao
    Wu, Chenrui
    Zhu, Xiaoyang
    Wang, Zibo
    Wang, Bailing
    [J]. PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7655 - 7660
  • [8] Research on attack graph generation for network security situation
    College of Computer Science and Technology Harbin Engineering University, Harbin, China
    不详
    [J]. Adv. Intell. Sys. Comput., (1147-1154):
  • [9] Defense scheme generation method using mixed path attack graph
    Yu, Yang
    Xia, Chun-He
    Hu, Xiao-Yun
    [J]. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2017, 51 (09): : 1745 - 1759
  • [10] A taxonomy for attack graph generation and usage in network securitya
    Kaynar, Kerem
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 29 : 27 - 56