Naggen: a Network Attack Graph GENeration Tool

被引:0
|
作者
Barrere, Martin [1 ]
Lupu, Emil C. [1 ]
机构
[1] Imperial Coll London, Dept Comp, London, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attack graphs constitute a powerful security tool aimed at modelling the many ways in which an attacker may compromise different assets in a network. Despite their usefulness in several security-related activities (e.g. hardening, monitoring, forensics), the complexity of these graphs can massively grow as the network becomes denser and larger, thus defying their practical usability. In this presentation, we first describe some of the problems that currently challenge the practical use of attack graphs. We then explain our approach based on core attack graphs, a novel perspective to address attack graph complexity. Finally, we present Naggen, a tool for generating, visualising and exploring core attack graphs. We use Naggen to show the advantages of our approach on different security applications.
引用
收藏
页码:378 / 379
页数:2
相关论文
共 50 条
  • [41] A Method Based on Global Attack Graph for Network Hardening
    Man, Dapeng
    Yang, Wu
    Yang, Yongtian
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4536 - 4539
  • [42] Attack Graph Analysis for Network Anti-Forensics
    Chandran, Rahul
    Yan, Wei Q.
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (01) : 28 - 50
  • [43] Heuristic Network Security Risk Based on Attack Graph
    Sun, Wei
    Li, Qianmu
    Wang, Pengchuan
    Hou, Jun
    [J]. CLOUD COMPUTING, CLOUDCOMP 2021, 2022, 430 : 181 - 194
  • [44] Automatic Construction and Optimization of Layered Network Attack Graph
    Wang, Yonggang
    Gui, Nike
    Hu, Jianbin
    Chen, Zhong
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 135 - 138
  • [45] Analytical Approach to Attack Graph Analysis for Network Security
    Kijsanayothin, Phongphun
    Hewett, Rattikorn
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 25 - 32
  • [46] Building network attack graph for alert causal correlation
    Zhang, Shaojun
    Li, Jianhua
    Chen, Xiuzhen
    Fan, Lei
    [J]. COMPUTERS & SECURITY, 2008, 27 (5-6) : 188 - 196
  • [47] Case Studies of Network Defense with Attack Graph Games
    Durkota, Karel
    Lisy, Viliam
    Kiekintveld, Christopher
    Bosansky, Branislav
    Pechoucek, Michal
    [J]. IEEE INTELLIGENT SYSTEMS, 2016, 31 (05) : 24 - 30
  • [48] Using network attack graph to predict the future attacks
    Lei, Jie
    Li, Zhi-Tang
    [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 940 - 944
  • [49] AI planning-based approach of attack graph generation
    Chen, Feng
    Su, Jin-Shu
    Han, Wen-Bao
    [J]. Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2008, 9 (05): : 460 - 465
  • [50] Design Procedure of Knowledge Base for Practical Attack Graph Generation
    Inokuchi, Masaki
    Ohta, Yoshinobu
    Kinoshita, Shunichi
    Yagyu, Tomohiko
    Stan, Orly
    Bitton, Ron
    Elovici, Yuval
    Shabtai, Asaf
    [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 594 - 601