Practical attack graph generation for network defense

被引:187
|
作者
Ingols, Kyle [1 ]
Lippmann, Richard [1 ]
Piwowarski, Keith [1 ]
机构
[1] MIT, Lincoln Lab, 244 Wood St, Lexington, MA 02420 USA
关键词
D O I
10.1109/ACSAC.2006.39
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patching the vulnerabilities and configuration errors that allow the attackers the greatest amount of access. We have created a new type of attack graph, the multiple-prerequisite graph, that scales nearly linearly as the size of a typical network increases. We have built a prototype system using this graph type. ne prototype uses readily available source data to automatically compute network reachability, classify vulnerabilities, build the graph, and recommend actions to improve network security. We have tested the prototype on an operational network with over 250 hosts, where it helped to discover a previously unknown configuration error It has processed complex simulated networks with over 50,000 hosts in under four minutes.
引用
收藏
页码:121 / +
页数:2
相关论文
共 50 条
  • [21] Concurrency Strategies for Attack Graph Generation
    Li, Ming
    Hawrylak, Peter J.
    Hale, John
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019), 2019, : 174 - 179
  • [22] Attack Graph Generation and Analysis Techniques
    Barik, Mridul Sankar
    Sengupta, Anirban
    Mazumdar, Chandan
    [J]. DEFENCE SCIENCE JOURNAL, 2016, 66 (06) : 559 - 567
  • [23] A method for global attack graph generation
    Man, Dapeng
    Zhang, Bing
    Yang, Wu
    Jin, Wenjin
    Yang, Yongtian
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 236 - +
  • [24] Attack Graph Generation for Microservice Architecture
    Ibrahim, Amjad
    Bozhinoski, Stevica
    Pretschner, Alexander
    [J]. SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 1235 - 1242
  • [25] The Construction and Application of Network Attack Graph
    Wang Yonggang
    Miao Yi
    Yang Yang
    Chen Zhong
    Hu Jianbin
    [J]. CHINA COMMUNICATIONS, 2009, 6 (04) : 71 - 74
  • [26] A Review on Network Attack Graph Technology
    Yuan, Bin-tao
    Pan, Zu-lie
    Shi, Fan
    [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 239 - 245
  • [27] Pairwise Gaussian Graph Convolutional Networks: Defense Against Graph Adversarial Attack
    Lu, Guangxi
    Xiong, Zuobin
    Meng, Jing
    Li, Wei
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4371 - 4376
  • [28] Research on computer network attack modeling based on attack graph
    Wang, Guo-Yu
    Wang, Hui-Mei
    Chen, Zhi-Jie
    Xian, Ming
    [J]. Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (04): : 74 - 80
  • [29] A network attack path prediction method using attack graph
    Liu, Xuguang
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020,
  • [30] Computer-attack graph generation tool
    Swiler, LP
    Phillips, C
    Ellis, D
    Chakerian, S
    [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 307 - 321