{"title":"一种用于网络安全管理的智能搜索技术","authors":"S. Bhattacharya, S. Ghosh","doi":"10.1504/IJAISC.2009.027299","DOIUrl":null,"url":null,"abstract":"Security is a challenging task for today's network administration. Usually, attackers penetrate into a network through a chain of exploits. Such an exploit sequence can be termed as an attack path, and the set of all possible attack paths forms an attack graph. In this paper, we propose a novel Artificial Intelligence (AI) based approach to find out an attack path consisting of logically connected exploits, which essentially shows the minimum number of exploits required to obtain access over a critical network asset. The solution is further extended to form an attack graph for the enterprise network.","PeriodicalId":364571,"journal":{"name":"Int. J. Artif. Intell. Soft Comput.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An intelligent search technique for network security administration\",\"authors\":\"S. Bhattacharya, S. Ghosh\",\"doi\":\"10.1504/IJAISC.2009.027299\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security is a challenging task for today's network administration. Usually, attackers penetrate into a network through a chain of exploits. Such an exploit sequence can be termed as an attack path, and the set of all possible attack paths forms an attack graph. In this paper, we propose a novel Artificial Intelligence (AI) based approach to find out an attack path consisting of logically connected exploits, which essentially shows the minimum number of exploits required to obtain access over a critical network asset. The solution is further extended to form an attack graph for the enterprise network.\",\"PeriodicalId\":364571,\"journal\":{\"name\":\"Int. J. Artif. Intell. Soft Comput.\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Artif. Intell. Soft Comput.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJAISC.2009.027299\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Artif. Intell. Soft Comput.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJAISC.2009.027299","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An intelligent search technique for network security administration
Security is a challenging task for today's network administration. Usually, attackers penetrate into a network through a chain of exploits. Such an exploit sequence can be termed as an attack path, and the set of all possible attack paths forms an attack graph. In this paper, we propose a novel Artificial Intelligence (AI) based approach to find out an attack path consisting of logically connected exploits, which essentially shows the minimum number of exploits required to obtain access over a critical network asset. The solution is further extended to form an attack graph for the enterprise network.