作者: Sushil Jajodia , Steven Noel
DOI:
关键词: Cyber-attack 、 Visualization 、 Information assurance 、 Side channel attack 、 Computer science 、 Information security 、 Network security 、 Adjacency matrix 、 Exploit 、 Computer security
摘要: Abstract : This project delivers an approach for visualization, correlation, and prediction of potentially large complex attack graphs. These graphs show multi-step cyber attacks against networks, based on system vulnerabilities, network connectivity, potential attacker exploits. We introduce a new paradigm graph analysis that augments the traditional graph-centric view, adjacency matrices. In our approach, includes all known paths, while still keeping complexity manageable. It supports pre-attack hardening, correlation detected events, origin/impact post-attack responses. The goal this is to transform quantities security data into actionable intelligence. utility organizing combinations as well established. Traditionally, such have been formed manually by red teams (penetration testers). demonstrated capability computational generation graphs, rather than relying manual creation. models conditions Because vulnerability interdependencies across topological needed, especially proactive defense insidious attacks. treats events in isolation, without context provided clearly insufficient.