会议专题

A New Method to Generate Attack Graphs

To address the scalability problem in attack graphs generation, we propose a novel method to generate attack graphs automatically. Our approach constructs a two-tier attack graph framework, which includes a host access graph and some sub-attack graphs. A subattack graph describes concrete attack scenarios from one source host to one target host, while the host access graph describes the attackers privilege transition among hosts. Our sub-attack graphs and host access graph have remarkable smaller scales and can help network administrators to find the key hosts in attack sequences. Analysis shows that the upper bound computational cost of our model is O(N3), which could also be competed in real time. The following experiment validates our approach.

network security attack graphs host access graph sub-attack graph

Anming Xie Guodong Chen Yonggang Wang Zhong Chen Jianbin Hu

Institute of Software, School of Electronics Engineering and Computer Science, Peking University, Be Dept. Of Electronic Engineering, The First Aeronautical College of Air Force, China Institute of Software, School of Electronics Engineering and Computer Science, Peking University, Be Institute of Software, School of Electronics Engineering and Computer Science, Peking University, Be Institute of Software, School of Electronics Engineering and Computer Science, Peking University, Be

国际会议

2009 Third IEEE International Conference on Secure Integration and Reliability Improvement SSIRI 2009(第三届IEEE安全软件集成及可信性改进国际会议)

上海

英文

401-406

2009-07-08(万方平台首次上网日期,不代表论文的发表时间)