Automated Generation of Attack Graphs Using NVD

被引:27
|
作者
Aksu, M. Ugur [1 ,2 ]
Bicakci, Kemal [2 ]
Dilek, M. Hadi [1 ]
Ozbayoglu, A. Murat [2 ]
Tatli, E. Islam [1 ]
机构
[1] STM Def Technol Engn & Trade Inc, Ankara, Turkey
[2] TOBB Univ Econ & Technol, Ankara, Turkey
关键词
attack graph generation; CVE; CVSS; NVD; vulnerability;
D O I
10.1145/3176258.3176339
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today's computer networks are prone to sophisticated multi-step, multi-host attacks. Common approaches of identifying vulnerabilities and analyzing the security of such networks with naive methods such as counting the number of vulnerabilities, or examining the vulnerabilities independently produces incomprehensive and limited security assessment results. On the other hand, attack graphs generated from the identified vulnerabilities at a network illustrate security risks via attack paths that are not apparent with the results of the primitive approaches. One common technique of generating attack graphs requires well established definitions and data of prerequisites and postconditions for the known vulnerabilities. A number of works suggest prerequisite and postcondition categorization schemes for software vulnerabilities. However, generating them in an automated way is an open issue. In this paper, we first define a model that evolves over the previous works to depict the requirements of exploiting vulnerabilities for generating attack graphs. Then we describe and compare the results of two different novel approaches (rule-based and machine learning-employed) that we propose for generating attacker privilege fields as prerequisites and postconditions from the National Vulnerability Database (NVD) in an automated way. We observe that prerequisite and postcondition privileges can be generated with overall accuracy rates of 88,8 % and 95,7 % with rule-based and machine learning-employed (Multilayer Perceptron) models respectively.
引用
收藏
页码:135 / 142
页数:8
相关论文
共 50 条
  • [41] ACCURIFY: Automated New Testflows Generation for Attack Variants in Threat Hunting
    Nour, Boubakr
    Pourzandi, Makan
    Qureshi, Rushaan Kamran
    Debbabi, Mourad
    FOUNDATIONS AND PRACTICE OF SECURITY, PT II, FPS 2023, 2024, 14552 : 52 - 69
  • [42] Ranking Attack Graphs
    Mehta, Vaibhav
    Bartzis, Constantinos
    Zhu, Haifeng
    Clarke, Edmund
    Wing, Jeannette
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2006, 4219 : 127 - 144
  • [43] Efficient Attack Plan Recognition using Automated Planning
    Amos-Binks, Adam
    Clark, Joshua
    Weston, Kirk
    Winters, Michael
    Harfoush, Khaled
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 1001 - 1006
  • [44] DOS attack using automated vulnerability scanning software
    Manolache, Florin B.
    Rusu, Octavian
    Subredu, Manuel
    Education Training and Information Communication Technologies RoEduNet' 05: Proceedings of the 4th International Conference RoEduNet Romania, 2005, : 261 - 267
  • [45] Automated software attack recovery using rollback and huddle
    Jesse Sathre
    Joseph Zambreno
    Design Automation for Embedded Systems, 2008, 12 : 243 - 260
  • [46] Automated software attack recovery using rollback and huddle
    Sathre, Jesse
    Zambreno, Joseph
    DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2008, 12 (03) : 243 - 260
  • [47] Automated Generation and Simulation of Component-Based Generalized Bond Graphs
    Dai, Siyuan
    Koutsoukos, Xenofon
    PROCEEDINGS OF THE 2012 10TH INTERNATIONAL CONFERENCE ON BOND GRAPH MODELING AND SIMULATION (ICBGM'12), 2012, 44 (13): : 31 - 40
  • [48] A Flexible Approach to Measuring Network Security Using Attack Graphs
    Chen Feng
    Su Jin-Shu
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 426 - 431
  • [49] SecKG: Leveraging attack detection and prediction using knowledge graphs
    Kriaa, Siwar
    Chaabane, Yahia
    2021 12TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2021, : 112 - 119
  • [50] Crown Jewels Analysis using Reinforcement Learning with Attack Graphs
    Gangupantulu, Rohit
    Cody, Tyler
    Rahma, Abdul
    Redino, Christopher
    Clark, Ryan
    Park, Paul
    2021 IEEE Symposium Series on Computational Intelligence, SSCI 2021 - Proceedings, 2021,