Naggen: a Network Attack Graph GENeration Tool

被引:0
|
作者
Barrere, Martin [1 ]
Lupu, Emil C. [1 ]
机构
[1] Imperial Coll London, Dept Comp, London, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attack graphs constitute a powerful security tool aimed at modelling the many ways in which an attacker may compromise different assets in a network. Despite their usefulness in several security-related activities (e.g. hardening, monitoring, forensics), the complexity of these graphs can massively grow as the network becomes denser and larger, thus defying their practical usability. In this presentation, we first describe some of the problems that currently challenge the practical use of attack graphs. We then explain our approach based on core attack graphs, a novel perspective to address attack graph complexity. Finally, we present Naggen, a tool for generating, visualising and exploring core attack graphs. We use Naggen to show the advantages of our approach on different security applications.
引用
收藏
页码:378 / 379
页数:2
相关论文
共 50 条
  • [11] Attack graph generation algorithm for large-scale network system
    Ye, Y. (yeyun1234@tom.com), 1600, Science Press (50):
  • [12] State Grid Network Attack-defense Graph Generation Method
    Zhou, Cheng
    Fei, Jia-xuan
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 389 - 398
  • [13] Distributed Attack Graph Generation
    Kaynar, Kerem
    Sivrikaya, Fikret
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 519 - 532
  • [14] Concurrency Strategies for Attack Graph Generation
    Li, Ming
    Hawrylak, Peter J.
    Hale, John
    2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019), 2019, : 174 - 179
  • [15] A method for global attack graph generation
    Man, Dapeng
    Zhang, Bing
    Yang, Wu
    Jin, Wenjin
    Yang, Yongtian
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 236 - +
  • [16] Attack Graph Generation and Analysis Techniques
    Barik, Mridul Sankar
    Sengupta, Anirban
    Mazumdar, Chandan
    DEFENCE SCIENCE JOURNAL, 2016, 66 (06) : 559 - 567
  • [17] Attack Graph Generation for Microservice Architecture
    Ibrahim, Amjad
    Bozhinoski, Stevica
    Pretschner, Alexander
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 1235 - 1242
  • [18] TAG: Topological Attack Graph Analysis Tool
    Malowidzki, Marek
    Hermanowski, Damian
    Berezinski, Przemyslaw
    2019 3RD CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2019,
  • [19] The Construction and Application of Network Attack Graph
    Wang Yonggang
    Miao Yi
    Yang Yang
    Chen Zhong
    Hu Jianbin
    CHINA COMMUNICATIONS, 2009, 6 (04) : 71 - 74
  • [20] A Review on Network Attack Graph Technology
    Yuan, Bin-tao
    Pan, Zu-lie
    Shi, Fan
    2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 239 - 245