首页> 外文会议>International conference on computer and network technology >Identifying attacking process based on Attack State Transition Graph
【24h】

Identifying attacking process based on Attack State Transition Graph

机译:基于攻击状态转移图的攻击过程识别

获取原文

摘要

To defend against multi-step intrusions in networks, efficient methods are needed to correlate isolated alerts into attack scenarios so as to identify intruding process. In this paper a model for network safety analysis is proposed which is defined as Attack State Transition Graph (ASTG). The model is given a formalized description based on Expanded Finite-State Automata (EFSA). Based on ASTG all the possible paths to the target are found. Thus ASTG indicates attacker's intruding process and state transformation and so that it can be used to analyse attack situation and further to evaluate network risk. The algorithms for generating ASTG and searching paths are also provided. Finally a simulation experiment is used to verify availability and validity of this model and illustrates its advantage by comparing with two other models.
机译:为了防御网络中的多步骤入侵,需要有效的方法将孤立的警报关联到攻击场景中,以识别入侵过程。本文提出了一种用于网络安全分析的模型,该模型被定义为攻击状态转换图(ASTG)。基于扩展有限状态自动机(EFSA),对该模型进行了形式化描述。基于ASTG,找到到目标的所有可能路径。因此,ASTG可以指示攻击者的入侵过程和状态转换,从而可以用来分析攻击情况并进一步评估网络风险。还提供了用于生成ASTG和搜索路径的算法。最后,通过仿真实验验证了该模型的可用性和有效性,并通过与其他两个模型进行比较说明了其优势。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号