DocumentCode :
3094515
Title :
A Simplified Model for Attack Paths Construction in Multiple Hosts
Author :
Zhang, Xiao-Song ; Zheng, Jiong ; Zou, Ji-Wei
Author_Institution :
Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
fYear :
2010
fDate :
17-19 Sept. 2010
Firstpage :
1310
Lastpage :
1313
Abstract :
Vulnerabilities do enormous harm to personal computers. What is worse, with emergence of much more applications of computer networks nowadays, network security caused by vulnerabilities has become an important issue. And attacks turned more proficient, making it much more difficult to protect our computer networks. In view of the security issue of complex network, effective identification of attack paths contributes to network security defense a lot. In order to obtain the paths, attack graphs are used. And to construct it requires preconditions like vulnerabilities information, network configuration, and etc. In this paper, we present a simplified model to construct the attack paths. We discuss the construction of attack paths taking advantage of logic programming and corresponding preconditions generated by the logic rule and facts.
Keywords :
computer crime; computer network security; graphs; logic programming; attack path construction; computer networks application; logic programming; logic rule; multiple host; network security; personal computer; security issue; Cognition; Computers; Data structures; Logic programming; Security; Servers; Transforms; attack graphs; logic programming; network security; vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Computing Signal Processing and Applications (PCSPA), 2010 First International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-1-4244-8043-2
Electronic_ISBN :
978-0-7695-4180-8
Type :
conf
DOI :
10.1109/PCSPA.2010.321
Filename :
5636191
Link To Document :
بازگشت