首页> 外文会议>Computer Security Applications Conference >Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
【24h】

Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs

机译:通过利用依赖性图表高效的最小成本网络硬化

获取原文

摘要

In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to compute attack paths (combinations of exploits), from which one can decide whether a given set of network hardening measures guarantees the safety of given critical resources. We go beyond attack paths to compute actual sets of hardening measures (assignments of initial network conditions) that guarantee the safety of given critical resources. Moreover, for given costs associated with individual hardening measures, we compute assignments that minimize overall cost. By doing our minimization at the level of initial conditions rather than exploits, we resolve hardening irrelevancies and redundancies in a way that cannot be done through previously proposed exploit-level approaches. Also, we use an efficient exploit-dependency representation based on monotonic logic that has polynomial complexity, as opposed to many previous attack graph representations having exponential complexity.
机译:对网络安全漏洞的深入分析必须考虑攻击者不仅可以孤立,而且还组合。这个问题的一般方法是计算攻击路径(利用的组合),从中可以决定给定的一组网络化硬化措施是否保证了给定的关键资源的安全性。我们超越攻击路径以计算保证给定关键资源的安全性的硬化措施(初始网络条件的分配)。此外,对于与各个硬化措施相关的特定成本,我们计算最小化整体成本的分配。通过在初始条件的水平而不是利用的程度上进行最小化,我们以通过先前提出的利用级别方法无法完成的方式解决硬化无关紧要和冗余。此外,我们使用基于具有多项式复杂度的单调逻辑的有效利用依赖性表示,而不是具有指数复杂性的许多先前攻击图表表示。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号