首页> 外文会议>20th international conference on computer applications in industry and engineering >Efficient Update on Exploitation Graphs for Vulnerability Analysis
【24h】

Efficient Update on Exploitation Graphs for Vulnerability Analysis

机译:有效利用漏洞利用图更新漏洞分析

获取原文
获取原文并翻译 | 示例

摘要

A graph-based attack modeling technique is a formal approach for representing attack scenarios. One approach in this area is referred to as an exploitation graph (e-graph). This paper extends previous work on the e-graph approach by adding a function to efficiently insert new exploitations into the generated e-graph. The proposed algorithm has a time complexity that is much less than the original graph-generation algorithm. A case study is presented to support this claim. In addition to the update on the vulnerability information, the proposed technique can also be adapted to reflect updates on other security-related knowledge. This process will greatly assist the attack simulation process and can be used to perform various vulnerability studies.
机译:基于图的攻击建模技术是代表攻击场景的一种正式方法。该领域中的一种方法称为开发图(e-graph)。本文通过添加功能以将新的漏洞利用有效地插入到生成的电子图中,扩展了以前在电子图方法方面的工作。所提出的算法的时间复杂度远小于原始图生成算法。提出了一个案例研究来支持这一主张。除了对漏洞信息进行更新之外,建议的技术还可以适用于反映对其他与安全相关的知识的更新。此过程将极大地协助攻击模拟过程,并可用于执行各种漏洞研究。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号