A New Method to Generate Attack Graphs
To address the scalability problem in attack graphs generation, we propose a novel method to generate attack graphs automatically. Our approach constructs a two-tier attack graph framework, which includes a host access graph and some sub-attack graphs. A subattack graph describes concrete attack scenarios from one source host to one target host, while the host access graph describes the attackers privilege transition among hosts. Our sub-attack graphs and host access graph have remarkable smaller scales and can help network administrators to find the key hosts in attack sequences. Analysis shows that the upper bound computational cost of our model is O(N3), which could also be competed in real time. The following experiment validates our approach.
network security attack graphs host access graph sub-attack graph
Anming Xie Guodong Chen Yonggang Wang Zhong Chen Jianbin Hu
Institute of Software, School of Electronics Engineering and Computer Science, Peking University, Be Dept. Of Electronic Engineering, The First Aeronautical College of Air Force, China Institute of Software, School of Electronics Engineering and Computer Science, Peking University, Be Institute of Software, School of Electronics Engineering and Computer Science, Peking University, Be Institute of Software, School of Electronics Engineering and Computer Science, Peking University, Be
国际会议
上海
英文
401-406
2009-07-08(万方平台首次上网日期,不代表论文的发表时间)