{"title":"一种独立于漏洞和利用的攻击路径预测方法","authors":"S. Malhotra, S. Bhattacharya, S.K. Ghosh","doi":"10.1109/CIT.2008.WORKSHOPS.73","DOIUrl":null,"url":null,"abstract":"Network Security has gained an ever increasing importance today because of the increased dependence on the networks. One way to assess the threats to the networks is through the use of the attack graphs. However, because of their sheer enormity and complexity the analysis becomes difficult. Given an attack graph the identification of a probable attack path still remains an issue. This paper presents an attack path identification methodology which is both efficient and scalable. The proposed approach is based on the attack surface measure of the individual hosts comprising the network and the access levels between them and it identifies the attack path independent of the vulnerabilities or the exploits that may exist.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"A Vulnerability and Exploit Independent Approach for Attack Path Prediction\",\"authors\":\"S. Malhotra, S. Bhattacharya, S.K. Ghosh\",\"doi\":\"10.1109/CIT.2008.WORKSHOPS.73\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network Security has gained an ever increasing importance today because of the increased dependence on the networks. One way to assess the threats to the networks is through the use of the attack graphs. However, because of their sheer enormity and complexity the analysis becomes difficult. Given an attack graph the identification of a probable attack path still remains an issue. This paper presents an attack path identification methodology which is both efficient and scalable. The proposed approach is based on the attack surface measure of the individual hosts comprising the network and the access levels between them and it identifies the attack path independent of the vulnerabilities or the exploits that may exist.\",\"PeriodicalId\":155998,\"journal\":{\"name\":\"2008 IEEE 8th International Conference on Computer and Information Technology Workshops\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-07-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE 8th International Conference on Computer and Information Technology Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIT.2008.WORKSHOPS.73\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.73","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Vulnerability and Exploit Independent Approach for Attack Path Prediction
Network Security has gained an ever increasing importance today because of the increased dependence on the networks. One way to assess the threats to the networks is through the use of the attack graphs. However, because of their sheer enormity and complexity the analysis becomes difficult. Given an attack graph the identification of a probable attack path still remains an issue. This paper presents an attack path identification methodology which is both efficient and scalable. The proposed approach is based on the attack surface measure of the individual hosts comprising the network and the access levels between them and it identifies the attack path independent of the vulnerabilities or the exploits that may exist.