首页> 外文会议>Cyber Security Cryptography and Machine Learning >Scalable Attack Path Finding for Increased Security
【24h】

Scalable Attack Path Finding for Increased Security

机译:可扩展的攻击路径查找以提高安全性

获取原文
获取原文并翻译 | 示例

摘要

Software vulnerabilities can be leveraged by attackers to gain control of a host. Attackers can then use the controlled hosts as stepping stones for compromising other hosts until they create a path to the critical assets. Consequently, network administrators must examine the protected network as a whole rather than each vulnerable host independently. To this end, various methods were suggested in order to analyze the multitude of attack paths in a given organizational network, for example, to identify the optimal attack paths. The down side of many of those methods is that they do not scale well to medium-large networks with hundreds or thousands of hosts. We suggest using graph reduction techniques in order to simplify the task of searching and eliminating optimal attacker paths. Results on an attack graph extracted from a network of a real organization with more than 300 hosts and 2400 vulnerabilities show that using the proposed graph reductions can improve the search time by a factor of 4 while maintaining the quality of the results.
机译:攻击者可以利用软件漏洞来控制主机。然后,攻击者可以将受控主机用作破坏其他主机的垫脚石,直到他们创建通往关键资产的路径。因此,网络管理员必须整体检查受保护的网络,而不是独立检查每个易受攻击的主机。为此,提出了各种方法以分析给定组织网络中的多种攻击路径,例如,确定最佳攻击路径。这些方法中的许多缺点是,它们无法很好地扩展到具有成百上千个主机的中型网络。我们建议使用图归约技术以简化搜索和消除最佳攻击者路径的任务。从具有300多个主机和2400个漏洞的真实组织的网络中提取的攻击图的结果表明,使用所建议的图,减少攻击次数可以将搜索时间缩短4倍,同时保持结果的质量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号