Title :
An Intelligent Model for Vulnerability Analysis Using Attack Graph
Author :
Yi, Wang ; Jinghua, Xiao
Author_Institution :
Sch. of Comput. Sci. & Technol., Wuhan Univ. of Sci. & Technol. (WUST), Wuhan, China
Abstract :
Constructing attack graph is an important approach to analyze vulnerabilities. Although automated generating attack graph have been proposed to discover the possible attack graphs efficiently, they still require manual effort and expert knowledge to describe the attack templates before the computerized model checking procedure can be performed. Moreover, without considering the configuration changes and attackers´ goals in large complicated network, many attack graphs generated may be impractical in real attack. In this paper, we proposed an intelligent model for vulnerability analysis, taking into account of the attackers´ goals and configuration information, which automatically generates attack graphs by defining a series of prolog facts and rules.
Keywords :
security of data; attackers goals; automated generating attack graph; computerized model checking procedure; configuration information; intelligent model; vulnerability analysis; Application software; Computer science; Engines; Information analysis; Information technology; Intelligent networks; Java; Libraries; Security; attack graph; intelligent; vulnerability;
Conference_Titel :
Information Technology and Applications, 2009. IFITA '09. International Forum on
Conference_Location :
Chengdu
Print_ISBN :
978-0-7695-3600-2
DOI :
10.1109/IFITA.2009.436