【24h】

Attack graphs for defending cyber assets

机译:防御网络资产的攻击图

获取原文

摘要

Next Generation security tools will have proactive security strategy far beyond the classical firewalls and antivirus scanners possess. Attack graphs vulnerabilities chain or multistage, multi-host attacks is valuable input for defenders. Importance of Attack graphs and one approach to formulate and use it to defend cyber assets has been put forward in this paper. Further analysis using graph theory has been carried out on the attack graph for Vulnerability assessment and Target node identification. A vital concept has been introduced as Pivot node and the process of its identification has been discussed in this paper. Finally authors discusses implementation of the concepts in their cyber warfare testbed.
机译:下一代安全工具将具有主动安全策略,远远超过传统的防火墙和防病毒扫描程序所拥有的安全策略。攻击图漏洞链或多阶段,多主机攻击是防御者的宝贵信息。提出了攻击图的重要性以及制定和使用它来防御网络资产的一种方法。在攻击图上进行了图论的进一步分析,以评估漏洞和确定目标节点。引入了重要的概念作为枢轴节点,并讨论了其识别过程。最后,作者在其网络战测试平台中讨论了这些概念的实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号