Practical attack graph generation for network defense

被引:187
|
作者
Ingols, Kyle [1 ]
Lippmann, Richard [1 ]
Piwowarski, Keith [1 ]
机构
[1] MIT, Lincoln Lab, 244 Wood St, Lexington, MA 02420 USA
关键词
D O I
10.1109/ACSAC.2006.39
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patching the vulnerabilities and configuration errors that allow the attackers the greatest amount of access. We have created a new type of attack graph, the multiple-prerequisite graph, that scales nearly linearly as the size of a typical network increases. We have built a prototype system using this graph type. ne prototype uses readily available source data to automatically compute network reachability, classify vulnerabilities, build the graph, and recommend actions to improve network security. We have tested the prototype on an operational network with over 250 hosts, where it helped to discover a previously unknown configuration error It has processed complex simulated networks with over 50,000 hosts in under four minutes.
引用
收藏
页码:121 / +
页数:2
相关论文
共 50 条
  • [31] ATTACK GRAPH GENERATION WITH INFUSED FUZZY CLUSTERING
    Misra, Sudip
    Obaidat, Mohammad S.
    Bagchi, Atig
    Bhatt, Ravindara
    Ghosh, Soumalya
    [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 92 - +
  • [32] A scalable representation towards attack graph generation
    Bhattacharya, Somak
    Malhotra, Samresh
    Ghsoh, S. K.
    [J]. PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 149 - 152
  • [33] Overview on Attack Graph Generation and Visualization Technology
    Yi, Shengwei
    Peng, Yong
    Xiong, Qi
    Wang, Ting
    Dai, Zhonghua
    Gao, Haihui
    Xu, Junfeng
    Wang, Jiteng
    Xu, Lijuan
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2013,
  • [34] A Workflow for Distributed and Resilient Attack Graph Generation
    Palma, Alessandro
    Bonomi, Silvia
    [J]. 2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 185 - 187
  • [35] Research on Network Defense Graph Model in Network Security
    Qi, Feng
    Xu, Haili
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11): : 23 - 32
  • [36] Adversarial organization modeling for network attack/defense
    Wu, Ji
    Ye, Chaoqun
    Jin, Shiyao
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 90 - 99
  • [37] Common Network Attack Types and Defense Mechanisms
    Das, Resul
    Karabade, Abubakar
    Tuna, Gurkan
    [J]. 2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 2658 - 2661
  • [38] Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective
    Xu, Kaidi
    Chen, Hongge
    Liu, Sijia
    Chen, Pin-Yu
    Weng, Tsui-Wei
    Hong, Mingyi
    Lin, Xue
    [J]. PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 3961 - 3967
  • [39] Adversarial Examples for Graph Data: Deep Insights into Attack and Defense
    Wu, Huijun
    Wang, Chen
    Tyshetskiy, Yuriy
    Docherty, Andrew
    Lu, Kai
    Zhu, Liming
    [J]. PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 4816 - 4823
  • [40] Defense against membership inference attack in graph neural networks through graph perturbation
    Wang, Kai
    Wu, Jinxia
    Zhu, Tianqing
    Ren, Wei
    Hong, Ying
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (02) : 497 - 509