计算机工程 ›› 2012, Vol. 38 ›› Issue (21): 129-132.doi: 10.3969/j.issn.1000-3428.2012.21.035

• 安全技术 • 上一篇    下一篇

基于脆弱点利用关联的攻击图优化方法

李庆朋1,郑连清1,张串绒1,杨 仝1,2   

  1. (1. 空军工程大学电讯工程学院,西安 710077;2. 清华大学计算机科学与技术系,北京 100084)
  • 收稿日期:2011-11-01 出版日期:2012-11-05 发布日期:2012-11-02
  • 作者简介:李庆朋(1988-),男,硕士研究生,主研方向:网络安全;郑连清,教授;张串绒,副教授;杨 仝,博士研究生
  • 基金项目:
    国家自然科学基金资助项目(60873233)

Optimization Method for Attack Graph Based on Vulnerability Exploit Correlation

LI Qing-peng 1, ZHENG Lian-qing 1, ZHANG Chuan-rong 1, YANG Tong 1,2   

  1. (1. Telecommunication Engineering Institute, Air Force Engineering University, Xi’an 710077, China; 2. Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China)
  • Received:2011-11-01 Online:2012-11-05 Published:2012-11-02

摘要: 现有的攻击图技术忽略了脆弱点之间的关联性,且大规模网络攻击图过于复杂。为解决上述问题,提出一种基于脆弱点利用(VE)关联的攻击图优化方法。对生成的攻击图进行预处理后,利用VE之间的关联性消除大规模网络攻击图中的冗余,并通过横向关联和纵向关联简化攻击图。仿真实验结果表明,该方法可以较好地优化攻击图的表达方式,为进行网络安全评估打下良好基础。

关键词: 网络安全, 脆弱点利用, 攻击图, 横向关联, 纵向关联, 安全评估

Abstract: Traditional attack graphs usually neglect the vulnerability correlation in network, and large-scale attack graphs are too complex. To solve the problems above, an optimization method for attack graph based on Vulnerability Exploit(VE) correlation is proposed. It eliminates the redundancy of attack graph by using the correlation between VE, and optimizes attack graph by transversal and vertical correlation, after pretreatment of the attack graph are generated. Experimental results show that the method can optimize the expression of attack graph better, and lay a good foundation for network security evaluation.

Key words: network security, Vulnerability Exploit(VE), attack graph, transversal correlation, vertical correlation, security evaluation

中图分类号: