Research on Automatic Generation and Analysis Technology of Network Attack Graph

被引:2
|
作者
Hu, Wenhui [1 ]
Zhang, Long [2 ]
Liu, Xueyang [1 ]
Huang, Yu [1 ]
Zhang, Minghui [3 ]
Xing, Liang [1 ]
机构
[1] Peking Univ, Natl Engn Res Ctr Software Engn, Beijing, Peoples R China
[2] Peking Univ, Sch Software & Microelect, Beijing, Peoples R China
[3] Peking Univ, Handan Inst Innovat, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
Edge Authority Attack Graph; Probability-based Network Vulnerability Measurement; Network Security Reinforcement; Network Security Metrics;
D O I
10.1109/BigDataSecurity-HPSC-IDS49724.2020.00033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In view of the problem that the overall security of the network is difficult to evaluate quantitatively, we propose the edge authority attack graph model, which aims to make up for the traditional dependence attack graph to describe the relationship between vulnerability behaviors. This paper proposed a network security metrics based on probability, and proposes a network vulnerability algorithm based on vulnerability exploit probability and attack target asset value. Finally, a network security reinforcement algorithm with network vulnerability index as the optimization target is proposed based on this metric algorithm.
引用
收藏
页码:133 / 139
页数:7
相关论文
共 50 条
  • [1] Generation and Risk Analysis of Network Attack Graph
    Prasad, Keshav
    Kumar, Santosh
    Negi, Anuradha
    Mahanti, Aniket
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 507 - 516
  • [2] Research on attack graph generation for network security situation
    College of Computer Science and Technology Harbin Engineering University, Harbin, China
    不详
    [J]. Adv. Intell. Sys. Comput., (1147-1154):
  • [3] Research on Network Dynamic Threat Analysis Technology Based on Attribute Attack Graph
    Yang Yingjie
    Leng Qiang
    Chang Dexian
    Pan Ruixuan
    Hu Hao
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (08) : 1838 - 1846
  • [4] A Review on Network Attack Graph Technology
    Yuan, Bin-tao
    Pan, Zu-lie
    Shi, Fan
    [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 239 - 245
  • [5] Overview on Attack Graph Generation and Visualization Technology
    Yi, Shengwei
    Peng, Yong
    Xiong, Qi
    Wang, Ting
    Dai, Zhonghua
    Gao, Haihui
    Xu, Junfeng
    Wang, Jiteng
    Xu, Lijuan
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2013,
  • [6] Naggen: a Network Attack Graph GENeration Tool
    Barrere, Martin
    Lupu, Emil C.
    [J]. 2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 378 - 379
  • [7] Practical attack graph generation for network defense
    Ingols, Kyle
    Lippmann, Richard
    Piwowarski, Keith
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
  • [8] Research on network attack analysis method based on attack graph of absorbing Markov chain
    Kang, Haiyan
    Long, Molan
    [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (02): : 122 - 135
  • [9] Automatic Construction and Optimization of Layered Network Attack Graph
    Wang, Yonggang
    Gui, Nike
    Hu, Jianbin
    Chen, Zhong
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 135 - 138
  • [10] Attack Graph Generation and Analysis Techniques
    Barik, Mridul Sankar
    Sengupta, Anirban
    Mazumdar, Chandan
    [J]. DEFENCE SCIENCE JOURNAL, 2016, 66 (06) : 559 - 567