TY - GEN
T1 - A vulnerability attack graph generation method based on scripts
AU - Han, Bo
AU - Wang, Qing
AU - Yu, Fajiang
AU - Zhang, Xianda
PY - 2012
Y1 - 2012
N2 - The vulnerability attack graph is an important method for prevention of network attacks. However, the huge amount of vulnerability has caused great difficulties for attack graph generation. By using the general search methods, we often retrieve many unrelated vulnerabilities from database, difficult to locate the true exploits of points. In this paper, we proposed an attack graph generation method based on scripts. It applied text mining technology to analyze in-depth vulnerability information. We have got a relatively small range of vulnerability. By combinations of these related vulnerability, we generated the attack graphs. The approach helps attack graph play better defense functionality.
AB - The vulnerability attack graph is an important method for prevention of network attacks. However, the huge amount of vulnerability has caused great difficulties for attack graph generation. By using the general search methods, we often retrieve many unrelated vulnerabilities from database, difficult to locate the true exploits of points. In this paper, we proposed an attack graph generation method based on scripts. It applied text mining technology to analyze in-depth vulnerability information. We have got a relatively small range of vulnerability. By combinations of these related vulnerability, we generated the attack graphs. The approach helps attack graph play better defense functionality.
KW - TF-IDF
KW - attack graph
KW - attack scripts
KW - information security
KW - vulnerability database
UR - http://www.scopus.com/inward/record.url?scp=84867627332&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-34062-8_6
DO - 10.1007/978-3-642-34062-8_6
M3 - Conference contribution
SN - 9783642340611
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 45
EP - 50
BT - Information Computing and Applications - Third International Conference, ICICA 2012, Proceedings
T2 - 3rd International Conference on Information Computing and Applications, ICICA 2012
Y2 - 14 September 2012 through 16 September 2012
ER -