Automated Generation of Attack Graphs Using NVD

被引:27
|
作者
Aksu, M. Ugur [1 ,2 ]
Bicakci, Kemal [2 ]
Dilek, M. Hadi [1 ]
Ozbayoglu, A. Murat [2 ]
Tatli, E. Islam [1 ]
机构
[1] STM Def Technol Engn & Trade Inc, Ankara, Turkey
[2] TOBB Univ Econ & Technol, Ankara, Turkey
关键词
attack graph generation; CVE; CVSS; NVD; vulnerability;
D O I
10.1145/3176258.3176339
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today's computer networks are prone to sophisticated multi-step, multi-host attacks. Common approaches of identifying vulnerabilities and analyzing the security of such networks with naive methods such as counting the number of vulnerabilities, or examining the vulnerabilities independently produces incomprehensive and limited security assessment results. On the other hand, attack graphs generated from the identified vulnerabilities at a network illustrate security risks via attack paths that are not apparent with the results of the primitive approaches. One common technique of generating attack graphs requires well established definitions and data of prerequisites and postconditions for the known vulnerabilities. A number of works suggest prerequisite and postcondition categorization schemes for software vulnerabilities. However, generating them in an automated way is an open issue. In this paper, we first define a model that evolves over the previous works to depict the requirements of exploiting vulnerabilities for generating attack graphs. Then we describe and compare the results of two different novel approaches (rule-based and machine learning-employed) that we propose for generating attacker privilege fields as prerequisites and postconditions from the National Vulnerability Database (NVD) in an automated way. We observe that prerequisite and postcondition privileges can be generated with overall accuracy rates of 88,8 % and 95,7 % with rule-based and machine learning-employed (Multilayer Perceptron) models respectively.
引用
收藏
页码:135 / 142
页数:8
相关论文
共 50 条
  • [1] Automated generation and analysis of attack graphs
    Sheyner, O
    Haines, J
    Jha, S
    Lippmann, R
    Wing, JM
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 273 - 284
  • [2] Generation and Analysis of Attack Graphs
    Wang, Chunying
    Du, Ning
    Yang, Huijing
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 4053 - 4057
  • [3] An Automated Framework for Generating Attack Graphs Using Known Security Threats
    Alnafrani, Rami
    Wijesekera, Duminda
    2022 10TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2022,
  • [4] Automated generation of attack trees
    Vigo, Roberto
    Nielson, Flemming
    Nielson, Hanne Riis
    Proceedings of the Computer Security Foundations Workshop, 2014, 2014-January : 337 - 350
  • [5] Automated Generation of Attack Trees
    Vigo, Roberto
    Nielson, Flemming
    Nielson, Hanne Riis
    2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 337 - 350
  • [6] Survey: Automatic generation of attack trees and attack graphs
    Konsta, Alyzia-Maria
    Lafuente, Alberto Lluch
    Spiga, Beatrice
    Dragoni, Nicola
    COMPUTERS & SECURITY, 2024, 137
  • [7] Automatic Generation of Attack Scripts from Attack Graphs
    Nichols, William
    Hill, Zac
    Hawrylak, Peter
    Hale, John
    Papa, Mauricio
    2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 267 - 274
  • [8] Automated cyber-attack scenario generation using the symbolic simulation
    Lee, JK
    Lee, MW
    Lee, JS
    Chi, SD
    Ohn, SY
    ARTIFICIAL INTELLIGENCE AND SIMULATION, 2004, 3397 : 380 - 389
  • [9] A Scalable Approach to Full Attack Graphs Generation
    Chen, Feng
    Su, Jinshu
    Zhang, Yi
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, PROCEEDINGS, 2009, 5429 : 150 - 163
  • [10] Automated Optimum Test Case Generation Using Web Navigation Graphs
    Shahzad, Ahmad
    Raza, Sajjad
    Azam, Muhammad N.
    Bilal, Khurram
    Inam-ul-Haq
    Shamail, Shafay
    ICET: 2009 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES, PROCEEDINGS, 2009, : 427 - 432