Abstract
The vulnerability attack graph is an important method for prevention of network attacks. However, the huge amount of vulnerability has caused great difficulties for attack graph generation. By using the general search methods, we often retrieve many unrelated vulnerabilities from database, difficult to locate the true exploits of points. In this paper, we proposed an attack graph generation method based on scripts. It applied text mining technology to analyze in-depth vulnerability information. We have got a relatively small range of vulnerability. By combinations of these related vulnerability, we generated the attack graphs. The approach helps attack graph play better defense functionality.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dawkins, J., Hale, J.: A systematic approach to multistage network attack analysis (2004)
Murphy, C.T., Yang, S.J.: Clustering of multistage cyber attacks using significant services. In: 13th Conference on Information Fusion (2010)
Mathew, S., Upadhyaya, S., Sudit, M., et al.: Situation awareness of multistage cyber attacks by semantic event fusion. In: IEEE Military Communications Conference, MILCOM, pp. 1286–1291 (2010)
Du, H., Liu, D., Holsopple, J., et al.: Toward ensemble characterization and projection of multistage cyber attacks. In: ICCCN (2010)
Yang, S.J., Stotz, A., Holsopple, J., et al.: High level information fusion for tracking and projection of multistage cyber attacks. Information Fusion 10(1), 107–121 (2009)
Hudson, J.: Weaponised malware: how criminals use digital certificates to cripple your organization. Network Security 6, 12–14 (2011)
Barik, M.S., Mazumdar, C.: A novel approach to collaborative security using attack graph. In: IMSAA 2011 (2011)
Somesh, J., Oleg, S., Jeannette, M.W.: Minimization and reliability analyses of attack graphs.Technical Report CMU-CS-02-109, Carnegie Mellon University (2002)
Wang, L., Noel, S., Jajodia, S.: Minimum-cost network hardening using attack graphs. Computer Communications 29(18), 3812–3824 (2006)
Zhong, S., Xu, G., Yang, Y., Yao, W., Yang, Y.: Algorithm of generating host-based attack graph for overall network. Advances in Information Sciences and Service Sciences 3(8), 104–110 (2011)
Zhang, B., Lu, K., Pan, X., Wu, Z.: Reverse search based network attack graph generation. In: CiSE (2009)
Han, J., Kambe, M.: Data mining: concepts and techniques, 2nd edn. Morgan Kaufmann Publishers (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Han, B., Wang, Q., Yu, F., Zhang, X. (2012). A Vulnerability Attack Graph Generation Method Based on Scripts. In: Liu, B., Ma, M., Chang, J. (eds) Information Computing and Applications. ICICA 2012. Lecture Notes in Computer Science, vol 7473. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34062-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-34062-8_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34061-1
Online ISBN: 978-3-642-34062-8
eBook Packages: Computer ScienceComputer Science (R0)