【24h】

Attack Graphs in Cybersecurity - Evolution and Practice

机译:网络安全中的攻击图-演变与实践

获取原文

摘要

Attack Graphs are very powerful tools used in many areas of information security including threat modelling, intrusion detection and prevention and forensic analysis given their capabilities in helping security analysts identify how attackers can exploit, or have exploited, vulnerabilities in a system in order to compromise it. Traditionally, attack graphs were generated manually, however that is an error prone process that gets exponentially harder the more elements or nodes are added to the system being analyzed. To overcome this issue many automatic generation tools and techniques have been proposed, and while those tools have allowed the generation of attack graphs of very large and complex systems, they have also made the analysis of the resulting attack graphs ever more complex. That is compounded by the ever growing number of attack graph variations, each aiming to elucidate different aspects of the security issues faced by the system. Together, the complexity and the large number of variations used in the industry, mean that learning to generate and analyze attack graphs can be a daunting task even for experienced security analysts. This tutorial aims to help those wishing to start learning about attack graphs by presenting an introductory overview of the subject. We will discuss how and when to use them, some of their most common types, like the state attack graph, the logical attack graph, the privilege graph and the vulnerability graph, the different tools and techniques used to generate them, and some of the most important open challenges in the field.
机译:攻击图是在信息安全的许多领域中使用的非常强大的工具,包括威胁建模,入侵检测和预防以及取证分析,因为它们具有帮助安全分析人员确定攻击者如何利用或利用系统中的漏洞来对其进行破坏的功能。 。传统上,攻击图是手动生成的,但是,这是一个容易出错的过程,如果将更多的元素或节点添加到要分析的系统中,则该过程将变得越来越困难。为了克服这个问题,已经提出了许多自动生成工具和技术,并且尽管这些工具允许生成非常大和复杂的系统的攻击图,但是它们也使得对所得攻击图的分析变得更加复杂。攻击图变体的数量不断增加,加剧了这种情况,每种变体旨在阐明系统所面临的安全问题的不同方面。总之,行业中使用的复杂性和大量变体意味着,即使对于有经验的安全分析师来说,学习生成和分析攻击图也可能是艰巨的任务。本教程旨在通过介绍该主题为那些希望开始学习攻击图的人们提供帮助。我们将讨论如何以及何时使用它们,它们最常见的一些类型,例如状态攻击图,逻辑攻击图,特权图和漏洞图,用于生成它们的不同工具和技术,以及一些该领域最重要的公开挑战。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号