首页> 外文会议>Sixth IEEE International Symposium on Cluster Computing and the Grid Workshops >Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs
【24h】

Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs

机译:涉及使用开发图对网络开发进行建模的集群安全性研究

获取原文

摘要

In this paper, we overview cluster security research underway at Mississippi State University (MSU) and focus on one particular effort involving a process to model system vulnerabilities and possible exploitations in specific cluster environments using exploitation graphs (e-graphs). Cluster security research at MSU has included attacks against clusters, anomaly detection, sensor fusion, VGLI security functionality in clusters, and the use of known system vulnerability data, system configuration data, and vulnerability scanner results to create e-graphs to model possible attack scenarios. The use of e-graphs is helpful in determining attacker work factor analysis, cost/benefit analysis of security, detection of attacks, and identification of critical vulnerabilities
机译:在本文中,我们概述了密西西比州立大学(MSU)正在进行的群集安全性研究,并将重点放在一项特定的工作上,该过程涉及使用漏洞利用图(e-graph)对特定群集环境中的系统漏洞和可能的漏洞利用进行建模的过程。 MSU的群集安全性研究包括针对群集的攻击,异常检测,传感器融合,群集中的VGLI安全功能,以及使用已知的系统漏洞数据,系统配置数据和漏洞扫描程序结果来创建电子图以对可能的攻击情形进行建模。电子图的使用有助于确定攻击者的工作因素分析,安全性的成本/收益分析,攻击的检测以及关键漏洞的识别

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号