Ye Ji, Ting Liu, Lequan Min, Geng Zhao, Xiaohong Qin
{"title":"基于人工智能的攻击图风险管理方法","authors":"Ye Ji, Ting Liu, Lequan Min, Geng Zhao, Xiaohong Qin","doi":"10.1109/CIS.2007.145","DOIUrl":null,"url":null,"abstract":"In today's large complex organizational network, security is a challenging task for most of the administrators. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of exploits constitutes an attack path and the set of all possible attack paths form an attack graph. Present day vulnerability scanners are able to identify the vulnerabilities in isolation but there is a need for correlation among these vulnerabilities to identify overall risk of the network. In this paper we propose a novel approach by finding out an attack path consisting of logically connected exploits and extends it to an attack graph. The solution also finds out the set of root cause vulnerabilities for overall security threat while taking care the inherent time and scalability problem of attack graph generation.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"An Artificial Intelligence Based Approach for Risk Management Using Attack Graph\",\"authors\":\"Ye Ji, Ting Liu, Lequan Min, Geng Zhao, Xiaohong Qin\",\"doi\":\"10.1109/CIS.2007.145\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today's large complex organizational network, security is a challenging task for most of the administrators. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of exploits constitutes an attack path and the set of all possible attack paths form an attack graph. Present day vulnerability scanners are able to identify the vulnerabilities in isolation but there is a need for correlation among these vulnerabilities to identify overall risk of the network. In this paper we propose a novel approach by finding out an attack path consisting of logically connected exploits and extends it to an attack graph. The solution also finds out the set of root cause vulnerabilities for overall security threat while taking care the inherent time and scalability problem of attack graph generation.\",\"PeriodicalId\":127238,\"journal\":{\"name\":\"2007 International Conference on Computational Intelligence and Security (CIS 2007)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-12-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Conference on Computational Intelligence and Security (CIS 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS.2007.145\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2007.145","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Artificial Intelligence Based Approach for Risk Management Using Attack Graph
In today's large complex organizational network, security is a challenging task for most of the administrators. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of exploits constitutes an attack path and the set of all possible attack paths form an attack graph. Present day vulnerability scanners are able to identify the vulnerabilities in isolation but there is a need for correlation among these vulnerabilities to identify overall risk of the network. In this paper we propose a novel approach by finding out an attack path consisting of logically connected exploits and extends it to an attack graph. The solution also finds out the set of root cause vulnerabilities for overall security threat while taking care the inherent time and scalability problem of attack graph generation.