【24h】

Mapping evidence graphs to attack graphs

机译:将证据图映射到攻击图

获取原文
获取原文并翻译 | 示例

摘要

Attack graphs compute potential attack paths from a system configuration and known vulnerabilities of a system. Evidence graphs model intrusion evidence and dependencies among them. In this paper, we show how to map evidence graphs to attack graphs. This mapping is useful for application of attack graphs and evidence graphs for forensic analysis. In addition to helping to refine attack graphs by using known sets of dependent attack evidence, important probabilistic information contained in evidence graphs can be used to compute or refine potential attack success probabilities obtained from repositories like CVSS. Conversely, attack graphs can be used to add missing evidence or remove irrelevant evidence trails to build a complete evidence graph. We illustrated the mapping by using a database attack as a case study.
机译:攻击图根据系统配置和系统的已知漏洞计算潜在的攻击路径。证据图对入侵证据及其之间的依赖关系进行建模。在本文中,我们展示了如何将证据图映射到攻击图。该映射对于将攻击图和证据图应用于法医分析很有用。除了通过使用已知的依赖攻击证据集来帮助精炼攻击图之外,证据图中包含的重要概率信息还可用于计算或精炼从诸如CVSS之类的存储库中获得的潜在攻击成功概率。相反,攻击图可用于添加缺少的证据或删除无关的证据线索,以构建完整的证据图。我们以数据库攻击为例说明了映射。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号