...
【24h】

MODELING AND ANALYSIS OF STEPPING STONE ATTACKS

机译:阶梯式石击的建模与分析

获取原文
获取原文并翻译 | 示例
           

摘要

Computer exploits often involve an attacker being able to compromise a sequence of hosts, creating a chain of "stepping stones" from his source to ultimate target. Stepping stones are usually necessary to access well-protected resources, and also serve to mask the attacker's location. This paper describes means of constructing models of networks and the access control mechanisms they employ to approach the problem of finding which stepping stone paths are easiest for an attacker to find. While the simplest formulation of the problem can be addressed with deterministic shortest-path algorithms, we argue that consideration of what and how an attacker may (or may not) launch from a compromised host pushes one towards solutions based on Monte Carlo sampling. We describe the sampling algorithm and some preliminary results obtained using it.
机译:计算机漏洞通常涉及攻击者能够破坏主机序列,从而从源头到最终目标创建一系列“垫脚石”。通常,必须使用垫脚石才能访问受到良好保护的资源,并且还可以掩盖攻击者的位置。本文介绍了构建网络模型的方法以及它们用来解决发现攻击者最容易找到哪些踏脚石路径的问题的访问控制机制。虽然可以使用确定性的最短路径算法来解决问题的最简单表述,但我们认为,考虑攻击者可能(或不可以)从受感染主机发起什么以及如何发动攻击,将促使人们寻求基于蒙特卡洛采样的解决方案。我们描述了采样算法以及使用该算法获得的一些初步结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号