首页> 外文会议>Annual Hawaii International Conference on System Sciences >Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering
【24h】

Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering

机译:通过安全工程利用图建模与模拟系统利用

获取原文
获取外文期刊封面目录资料

摘要

In this paper, we define a process to model and simulate attack scenarios in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are associated to create exploitation graphs (e-graphs) which are used to represent attack scenarios. Experiments carried out in a cluster computing environment showed the usefulness of proposed techniques in providing in-depth attack scenario analyses for security engineering. Critical vulnerabilities can be identified by employing graph algorithms. Several factors were used to measure the difficulty in executing an attack. A cost/benefit analysis was used for more accurate quantitative analysis of attack scenarios. We have also shown how the attack scenario analyses better help deployment of security products and design of network topologies.
机译:在本文中,我们定义了一个过程来模拟和模拟网络环境中的攻击方案。已知的系统漏洞数据,系统配置数据和漏洞扫描仪结果与创建用于表示攻击方案的剥削图(电子图形)相关联。在集群计算环境中进行的实验表明,在提供安全工程的深入攻击情景分析中提出技术的有用性。可以通过采用图形算法来识别关键漏洞。若干因素用于衡量执行攻击的困难。一种成本/效益分析用于对攻击情景的更准确的定量分析。我们还显示了攻击方案如何分析安全产品的更好部署和网络拓扑设计。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号