{"title":"基于APT攻击阶段模型的优化属性攻击图","authors":"Meicong Li, Wei Huang, Yongbin Wang, Wenqing Fan","doi":"10.1109/COMPCOMM.2016.7925204","DOIUrl":null,"url":null,"abstract":"Recent years people have witnessed a surge of interest in APT attack, due to its complexity and persistent attack characteristics. In this paper, we give an overview of APT attack and attack graph and also use attack graph to assist in predicting the APT attacks and identifying the most vulnerable resources. In order to prevent APT attacks, this article improves the attribute attack graph by depending on the APT attack stage model and puts forward the stage attribute attack graph. Experimental results showed that the stage attribute attack graph can accurately reflect the lifecycle of attacks, meanwhile identify the most vulnerable resources and predict the APT attacks to defend APT attacks on each APT attack stage in time.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"The optimized attribute attack graph based on APT attack stage model\",\"authors\":\"Meicong Li, Wei Huang, Yongbin Wang, Wenqing Fan\",\"doi\":\"10.1109/COMPCOMM.2016.7925204\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent years people have witnessed a surge of interest in APT attack, due to its complexity and persistent attack characteristics. In this paper, we give an overview of APT attack and attack graph and also use attack graph to assist in predicting the APT attacks and identifying the most vulnerable resources. In order to prevent APT attacks, this article improves the attribute attack graph by depending on the APT attack stage model and puts forward the stage attribute attack graph. Experimental results showed that the stage attribute attack graph can accurately reflect the lifecycle of attacks, meanwhile identify the most vulnerable resources and predict the APT attacks to defend APT attacks on each APT attack stage in time.\",\"PeriodicalId\":210833,\"journal\":{\"name\":\"2016 2nd IEEE International Conference on Computer and Communications (ICCC)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd IEEE International Conference on Computer and Communications (ICCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPCOMM.2016.7925204\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPCOMM.2016.7925204","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The optimized attribute attack graph based on APT attack stage model
Recent years people have witnessed a surge of interest in APT attack, due to its complexity and persistent attack characteristics. In this paper, we give an overview of APT attack and attack graph and also use attack graph to assist in predicting the APT attacks and identifying the most vulnerable resources. In order to prevent APT attacks, this article improves the attribute attack graph by depending on the APT attack stage model and puts forward the stage attribute attack graph. Experimental results showed that the stage attribute attack graph can accurately reflect the lifecycle of attacks, meanwhile identify the most vulnerable resources and predict the APT attacks to defend APT attacks on each APT attack stage in time.