Skip to main content

A Vulnerability Attack Graph Generation Method Based on Scripts

  • Conference paper
Information Computing and Applications (ICICA 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7473))

Included in the following conference series:

Abstract

The vulnerability attack graph is an important method for prevention of network attacks. However, the huge amount of vulnerability has caused great difficulties for attack graph generation. By using the general search methods, we often retrieve many unrelated vulnerabilities from database, difficult to locate the true exploits of points. In this paper, we proposed an attack graph generation method based on scripts. It applied text mining technology to analyze in-depth vulnerability information. We have got a relatively small range of vulnerability. By combinations of these related vulnerability, we generated the attack graphs. The approach helps attack graph play better defense functionality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dawkins, J., Hale, J.: A systematic approach to multistage network attack analysis (2004)

    Google Scholar 

  2. Murphy, C.T., Yang, S.J.: Clustering of multistage cyber attacks using significant services. In: 13th Conference on Information Fusion (2010)

    Google Scholar 

  3. Mathew, S., Upadhyaya, S., Sudit, M., et al.: Situation awareness of multistage cyber attacks by semantic event fusion. In: IEEE Military Communications Conference, MILCOM, pp. 1286–1291 (2010)

    Google Scholar 

  4. Du, H., Liu, D., Holsopple, J., et al.: Toward ensemble characterization and projection of multistage cyber attacks. In: ICCCN (2010)

    Google Scholar 

  5. Yang, S.J., Stotz, A., Holsopple, J., et al.: High level information fusion for tracking and projection of multistage cyber attacks. Information Fusion 10(1), 107–121 (2009)

    Article  Google Scholar 

  6. Hudson, J.: Weaponised malware: how criminals use digital certificates to cripple your organization. Network Security 6, 12–14 (2011)

    Article  Google Scholar 

  7. Barik, M.S., Mazumdar, C.: A novel approach to collaborative security using attack graph. In: IMSAA 2011 (2011)

    Google Scholar 

  8. Somesh, J., Oleg, S., Jeannette, M.W.: Minimization and reliability analyses of attack graphs.Technical Report CMU-CS-02-109, Carnegie Mellon University (2002)

    Google Scholar 

  9. Wang, L., Noel, S., Jajodia, S.: Minimum-cost network hardening using attack graphs. Computer Communications 29(18), 3812–3824 (2006)

    Article  Google Scholar 

  10. Zhong, S., Xu, G., Yang, Y., Yao, W., Yang, Y.: Algorithm of generating host-based attack graph for overall network. Advances in Information Sciences and Service Sciences 3(8), 104–110 (2011)

    Article  Google Scholar 

  11. Zhang, B., Lu, K., Pan, X., Wu, Z.: Reverse search based network attack graph generation. In: CiSE (2009)

    Google Scholar 

  12. Han, J., Kambe, M.: Data mining: concepts and techniques, 2nd edn. Morgan Kaufmann Publishers (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Han, B., Wang, Q., Yu, F., Zhang, X. (2012). A Vulnerability Attack Graph Generation Method Based on Scripts. In: Liu, B., Ma, M., Chang, J. (eds) Information Computing and Applications. ICICA 2012. Lecture Notes in Computer Science, vol 7473. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34062-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34062-8_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34061-1

  • Online ISBN: 978-3-642-34062-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics