Naggen: a Network Attack Graph GENeration Tool

被引:0
|
作者
Barrere, Martin [1 ]
Lupu, Emil C. [1 ]
机构
[1] Imperial Coll London, Dept Comp, London, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attack graphs constitute a powerful security tool aimed at modelling the many ways in which an attacker may compromise different assets in a network. Despite their usefulness in several security-related activities (e.g. hardening, monitoring, forensics), the complexity of these graphs can massively grow as the network becomes denser and larger, thus defying their practical usability. In this presentation, we first describe some of the problems that currently challenge the practical use of attack graphs. We then explain our approach based on core attack graphs, a novel perspective to address attack graph complexity. Finally, we present Naggen, a tool for generating, visualising and exploring core attack graphs. We use Naggen to show the advantages of our approach on different security applications.
引用
收藏
页码:378 / 379
页数:2
相关论文
共 50 条
  • [1] Computer-attack graph generation tool
    Swiler, LP
    Phillips, C
    Ellis, D
    Chakerian, S
    [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 307 - 321
  • [2] Practical attack graph generation for network defense
    Ingols, Kyle
    Lippmann, Richard
    Piwowarski, Keith
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
  • [3] Generation and Risk Analysis of Network Attack Graph
    Prasad, Keshav
    Kumar, Santosh
    Negi, Anuradha
    Mahanti, Aniket
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 507 - 516
  • [4] An Integrated Network Scanning Tool for Attack Graph Construction
    Cheng, Feng
    Roschke, Sebastian
    Meinel, Christoph
    [J]. ADVANCES IN GRID AND PERVASIVE COMPUTING, 2011, 6646 : 138 - 147
  • [5] Attack Graph Generation and Visualization for Industrial Control Network
    Feng, Yanli
    Sun, Gongliang
    Liu, Zhiyao
    Wu, Chenrui
    Zhu, Xiaoyang
    Wang, Zibo
    Wang, Bailing
    [J]. PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7655 - 7660
  • [6] Research on attack graph generation for network security situation
    College of Computer Science and Technology Harbin Engineering University, Harbin, China
    不详
    [J]. Adv. Intell. Sys. Comput., (1147-1154):
  • [7] A taxonomy for attack graph generation and usage in network securitya
    Kaynar, Kerem
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 29 : 27 - 56
  • [8] Attack Graph Generation with Machine Learning for Network Security
    Koo, Kijong
    Moon, Daesung
    Huh, Jun-Ho
    Jung, Se-Hoon
    Lee, Hansung
    [J]. ELECTRONICS, 2022, 11 (09)
  • [9] GARNET: A Graphical Attack graph and Reachability Network Evaluation Tool
    Williams, Leevar
    Lippmann, Richard
    Ingols, Kyle
    [J]. VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 44 - 59
  • [10] Research on Automatic Generation and Analysis Technology of Network Attack Graph
    Hu, Wenhui
    Zhang, Long
    Liu, Xueyang
    Huang, Yu
    Zhang, Minghui
    Xing, Liang
    [J]. 2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 133 - 139