Naggen: a Network Attack Graph GENeration Tool

被引:0
|
作者
Barrere, Martin [1 ]
Lupu, Emil C. [1 ]
机构
[1] Imperial Coll London, Dept Comp, London, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attack graphs constitute a powerful security tool aimed at modelling the many ways in which an attacker may compromise different assets in a network. Despite their usefulness in several security-related activities (e.g. hardening, monitoring, forensics), the complexity of these graphs can massively grow as the network becomes denser and larger, thus defying their practical usability. In this presentation, we first describe some of the problems that currently challenge the practical use of attack graphs. We then explain our approach based on core attack graphs, a novel perspective to address attack graph complexity. Finally, we present Naggen, a tool for generating, visualising and exploring core attack graphs. We use Naggen to show the advantages of our approach on different security applications.
引用
收藏
页码:378 / 379
页数:2
相关论文
共 50 条
  • [31] Strategies for Practical Hybrid Attack Graph Generation and Analysis
    Li, Ming
    Hawrylak, Peter
    Hale, John
    [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (04):
  • [32] A Generation Method of Attack Graph Based on Evolutionary Computation
    Wang, Jiajia
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ENERGY, ENVIRONMENT AND CHEMICAL ENGINEERING (AEECE 2016), 2016, 89 : 28 - 31
  • [33] Identifying Interdependencies Using Attack Graph Generation Methods
    Lever, Kirsty E.
    Kifayat, Kashif
    Merabti, Madjid
    [J]. 2015 11TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2015, : 80 - 85
  • [34] An Attack Graph Generation Method Based on Parallel Computing
    Cao, Ningyuan
    Lv, Kun
    Hu, Changzhen
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2018, 2018, 11287 : 34 - 48
  • [35] Multimodal graph inference network for scene graph generation
    Jingwen Duan
    Weidong Min
    Deyu Lin
    Jianfeng Xu
    Xin Xiong
    [J]. Applied Intelligence, 2021, 51 : 8768 - 8783
  • [36] Multimodal graph inference network for scene graph generation
    Duan, Jingwen
    Min, Weidong
    Lin, Deyu
    Xu, Jianfeng
    Xiong, Xin
    [J]. APPLIED INTELLIGENCE, 2021, 51 (12) : 8768 - 8783
  • [37] Exploiting Domination in Attack Graph for Enterprise Network Hardening
    Bopche, Ghanshyam S.
    Mehtre, Babu M.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 342 - 353
  • [38] A Survey of Network Attack Investigation Based on Provenance Graph
    基于溯源图的网络攻击调查研究综述
    [J]. Tian, Zhi-Hong (tianzhihong@gzhu.edu.cn), 1600, Chinese Institute of Electronics (52):
  • [39] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [40] Label flipping adversarial attack on graph neural network
    Wu, Yiteng
    Liu, Wei
    Yu, Hongtao
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 65 - 74