Use cases of attack graph for SOC optimization purpose

Anna Bánáti, Erno Rigó, Rita Fleiner, E. Kail
{"title":"Use cases of attack graph for SOC optimization purpose","authors":"Anna Bánáti, Erno Rigó, Rita Fleiner, E. Kail","doi":"10.1109/INES56734.2022.9922617","DOIUrl":null,"url":null,"abstract":"The development and deployment of dynamic and adaptive cyber defense solutions are essential to face the extremely fast evolving and increasingly common cyberattacks. Security Operation Centers (SOC) are widely used recently to correctly identify, analyze, defend, and investigate security incidents. In order to defend our networks, it is also essential to identify vulnerabilities and weaknesses in the system. Nowadays, attack graphs are the most frequently used graphical representations of a system's vulnerabilities as well as different attack paths an attacker may carry out. This paper investigates the possible use cases of attack graphs in a Security Operation Center. It also identifies different areas and point out potential research directions.","PeriodicalId":253486,"journal":{"name":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INES56734.2022.9922617","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The development and deployment of dynamic and adaptive cyber defense solutions are essential to face the extremely fast evolving and increasingly common cyberattacks. Security Operation Centers (SOC) are widely used recently to correctly identify, analyze, defend, and investigate security incidents. In order to defend our networks, it is also essential to identify vulnerabilities and weaknesses in the system. Nowadays, attack graphs are the most frequently used graphical representations of a system's vulnerabilities as well as different attack paths an attacker may carry out. This paper investigates the possible use cases of attack graphs in a Security Operation Center. It also identifies different areas and point out potential research directions.
用例攻击图SOC优化的目的
动态和自适应网络防御解决方案的开发和部署对于应对快速发展和日益常见的网络攻击至关重要。近年来,安全运营中心(SOC)被广泛用于正确识别、分析、防范和调查安全事件。为了保护我们的网络,识别系统中的漏洞和弱点也很重要。如今,攻击图是系统漏洞以及攻击者可能实施的不同攻击路径的最常用图形表示。本文研究了安全运营中心中攻击图的可能用例。它还确定了不同的领域并指出了潜在的研究方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信