Naggen: a Network Attack Graph GENeration Tool

被引:0
|
作者
Barrere, Martin [1 ]
Lupu, Emil C. [1 ]
机构
[1] Imperial Coll London, Dept Comp, London, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attack graphs constitute a powerful security tool aimed at modelling the many ways in which an attacker may compromise different assets in a network. Despite their usefulness in several security-related activities (e.g. hardening, monitoring, forensics), the complexity of these graphs can massively grow as the network becomes denser and larger, thus defying their practical usability. In this presentation, we first describe some of the problems that currently challenge the practical use of attack graphs. We then explain our approach based on core attack graphs, a novel perspective to address attack graph complexity. Finally, we present Naggen, a tool for generating, visualising and exploring core attack graphs. We use Naggen to show the advantages of our approach on different security applications.
引用
收藏
页码:378 / 379
页数:2
相关论文
共 50 条
  • [21] A network attack path prediction method using attack graph
    Liu, Xuguang
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020,
  • [22] ATTACK GRAPH GENERATION WITH INFUSED FUZZY CLUSTERING
    Misra, Sudip
    Obaidat, Mohammad S.
    Bagchi, Atig
    Bhatt, Ravindara
    Ghosh, Soumalya
    [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 92 - +
  • [23] A scalable representation towards attack graph generation
    Bhattacharya, Somak
    Malhotra, Samresh
    Ghsoh, S. K.
    [J]. PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 149 - 152
  • [24] Overview on Attack Graph Generation and Visualization Technology
    Yi, Shengwei
    Peng, Yong
    Xiong, Qi
    Wang, Ting
    Dai, Zhonghua
    Gao, Haihui
    Xu, Junfeng
    Wang, Jiteng
    Xu, Lijuan
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2013,
  • [25] A Workflow for Distributed and Resilient Attack Graph Generation
    Palma, Alessandro
    Bonomi, Silvia
    [J]. 2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 185 - 187
  • [26] An empirical test of the accuracy of an attack graph analysis tool
    Sommestad, Teodor
    Sandstrom, Fredrik
    [J]. INFORMATION AND COMPUTER SECURITY, 2015, 23 (05) : 516 - 531
  • [27] Network Vulnerability Assessment based on Attack Graph
    Wang Huan
    Zhao Jianping
    Liu Dan
    Li Bo
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 542 - 545
  • [28] Attack graph based evaluation of network security
    Kotenko, Igor
    Stepashkin, Mikhail
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227
  • [29] An Attack Path Generation Methods Based on Graph Database
    Yuan, Bintao
    Pan, Zulie
    Shi, Fan
    Li, Zhenhan
    [J]. PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1905 - 1910
  • [30] Attack Graph Generation, Visualization and Analysis: Issues and Challenges
    Bopche, Ghanshyam S.
    Mehtre, Babu M.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 379 - 390