首页> 外文会议>IEEE International Conference on Computer-Aided Industrial Design Conceptual Design >Approach to attack path generation based on vulnerability correlation
【24h】

Approach to attack path generation based on vulnerability correlation

机译:基于漏洞相关性的攻击路径生成方法

获取原文

摘要

Network attack path analysis is an important method for analyzing the security status of computer network, which can automatically analyze the correlation between network vulnerabilities and potential threats resulting from vulnerabilities. It plays a guiding role in establishing network security policy. This paper chooses NVD and Bugtraq as vulnerability data sources, and extracts key properties required to build a vulnerability database that mainly contains privilege escalation vulnerabilities in Linux system and common server software. An association analysis of vulnerabilities and related information is made and properties are abstracted to construct atomic attacks and corresponding atomic attack database. A network attack model is constructed from network connection and host configuration. Via matching atomic attacks in attack database, the paper adopts state comparison algorithm to mine potential attack paths that may lead to specified attack goals. The experiment verifies that the proposed approach can reduce the number of attack states effectively and mine all non-redundant attack paths.
机译:网络攻击路径分析是分析计算机网络安全状态的重要方法,它可以自动分析网络漏洞之间的相关性和漏洞产生的潜在威胁。它在建立网络安全策略方面发挥了指导作用。本文将NVD和BugtraQ选择为漏洞数据源,并提取构建漏洞数据库所需的关键属性,该数据库主要包含Linux系统和公共服务器软件中的特权升级漏洞。对漏洞和相关信息的关联分析,抽象属性以构建原子攻击和相应的原子攻击数据库。网络攻击模型由网络连接和主机配置构建。通过匹配的攻击数据库中的原子攻击,纸张采用状态比较算法来挖掘可能导致指定攻击目标的潜在攻击路径。实验验证了所提出的方法可以有效地降低攻击状态的数量,并挖掘所有非冗余攻击路径。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号