@inproceedings{761125263aca41d089a6561ae7396649,
title = "A vulnerability attack graph generation method based on scripts",
abstract = "The vulnerability attack graph is an important method for prevention of network attacks. However, the huge amount of vulnerability has caused great difficulties for attack graph generation. By using the general search methods, we often retrieve many unrelated vulnerabilities from database, difficult to locate the true exploits of points. In this paper, we proposed an attack graph generation method based on scripts. It applied text mining technology to analyze in-depth vulnerability information. We have got a relatively small range of vulnerability. By combinations of these related vulnerability, we generated the attack graphs. The approach helps attack graph play better defense functionality.",
keywords = "TF-IDF, attack graph, attack scripts, information security, vulnerability database",
author = "Bo Han and Qing Wang and Fajiang Yu and Xianda Zhang",
year = "2012",
doi = "10.1007/978-3-642-34062-8\_6",
language = "English",
isbn = "9783642340611",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "45--50",
booktitle = "Information Computing and Applications - Third International Conference, ICICA 2012, Proceedings",
note = "3rd International Conference on Information Computing and Applications, ICICA 2012 ; Conference date: 14-09-2012 Through 16-09-2012",
}