A vulnerability attack graph generation method based on scripts

Bo Han*, Qing Wang, Fajiang Yu, Xianda Zhang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

The vulnerability attack graph is an important method for prevention of network attacks. However, the huge amount of vulnerability has caused great difficulties for attack graph generation. By using the general search methods, we often retrieve many unrelated vulnerabilities from database, difficult to locate the true exploits of points. In this paper, we proposed an attack graph generation method based on scripts. It applied text mining technology to analyze in-depth vulnerability information. We have got a relatively small range of vulnerability. By combinations of these related vulnerability, we generated the attack graphs. The approach helps attack graph play better defense functionality.

Original languageEnglish
Title of host publicationInformation Computing and Applications - Third International Conference, ICICA 2012, Proceedings
Pages45-50
Number of pages6
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event3rd International Conference on Information Computing and Applications, ICICA 2012 - Chengde, China
Duration: 14 Sept 201216 Sept 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7473 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Conference on Information Computing and Applications, ICICA 2012
Country/TerritoryChina
CityChengde
Period14/09/1216/09/12

Fingerprint

Dive into the research topics of 'A vulnerability attack graph generation method based on scripts'. Together they form a unique fingerprint.

Cite this