DocumentCode :
1804441
Title :
Approach to attack path generation based on vulnerability correlation
Author :
Yu, Xiaohong ; Jiang, Jianhui ; Shuai, Chunyan
Author_Institution :
Department of Computer Science and Technology, Tongji University, Shanghai 201804, China
fYear :
2013
fDate :
1-8 Jan. 2013
Firstpage :
1
Lastpage :
6
Abstract :
Network attack path analysis is an important method for analyzing the security status of computer network, which can automatically analyze the correlation between network vulnerabilities and potential threats resulting from vulnerabilities. It plays a guiding role in establishing network security policy. This paper chooses NVD and Bugtraq as vulnerability data sources, and extracts key properties required to build a vulnerability database that mainly contains privilege escalation vulnerabilities in Linux system and common server software. An association analysis of vulnerabilities and related information is made and properties are abstracted to construct atomic attacks and corresponding atomic attack database. A network attack model is constructed from network connection and host configuration. Via matching atomic attacks in attack database, the paper adopts state comparison algorithm to mine potential attack paths that may lead to specified attack goals. The experiment verifies that the proposed approach can reduce the number of attack states effectively and mine all non-redundant attack paths.
Keywords :
Buffer overflows; Complexity theory; Correlation; Databases; Linux; Security; Software; atomic attack; attack path generation; network attack; network vulnerability; vulnerability correlation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Conference Anthology, IEEE
Conference_Location :
China
Type :
conf
DOI :
10.1109/ANTHOLOGY.2013.6784925
Filename :
6784925
Link To Document :
بازگشت