作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2007, Vol. 33 ›› Issue (20): 150-152. doi: 10.3969/j.issn.1000-3428.2007.20.052

• 安全技术 • 上一篇    下一篇

基于系统漏洞的攻击场景构建

孙 雷1,姜淑娟1,曾英佩2,3,郭山清2,3   

  1. (1. 中国矿业大学计算机科学与技术学院,徐州 221008;2. 南京大学软件新技术国家重点实验室,南京 210093;3. 南京大学计算机科学与技术系,南京 210093)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2007-10-20 发布日期:2007-10-20

Attack Scenarios Construction Based on System Vulnerabilities

SUN Lei1, JIANG Shu-juan1, ZENG Ying-pei2,3, GUO Shan-qing2,3   

  1. (1. School of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221008; 2. State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093; 3. Department of Computer Science and Technology, Nanjing University, Nanjing 210093)
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-10-20 Published:2007-10-20

摘要: 在分析基于攻击前提和后果关联方法的基础上,提出了一种基于系统漏洞和报警相关度的攻击场景构建方法。它不仅能够利用系统漏洞信息验证报警的可靠性,排除误报,而且能够通过报警之间的相关度关联多跳攻击过程。实验结果表明,此方法能够有效地减少误报和漏报,从而有助于构建更加真实完整的攻击场景。

关键词: 漏洞, 相关度, 攻击场景

Abstract: The paper analyzes the method that correlates alerts on the basis of prerequisites and consequences. Then it proposes a method for constructing attack scenarios based on system vulnerabilities and alert relativity. It not only can validate the reliability of alerts through system vulnerabilities, remove false positives, but also can correlate attacks including many steps through alert relativity. The experiment results have demonstrated that the proposed approach can decrease false positives and false negatives effectively. It can help to construct more authentic and integrated attack scenarios.

Key words: vulnerability, relativity, attack scenarios

中图分类号: