DocumentCode :
2425563
Title :
Mining Privilege Escalation Paths for Network Vulnerability Analysis
Author :
Zhang, Baowen ; Zhu, William ; Xue, Zhi
Author_Institution :
Shanghai Jiaotong Univ., Shanghai
Volume :
4
fYear :
2007
fDate :
24-27 Aug. 2007
Firstpage :
56
Lastpage :
60
Abstract :
Computer security is an important issue in our society. In order to prevent computer systems and networks from attacks, we should try to find flaws in these systems and evaluate them. Generally researchers and red teams use attack graphs to perform network vulnerability analysis, which tend to suffer scalability problems. In this paper we put forward a mining method to generate privilege escalation paths in networks. With these privilege escalation paths we create net privilege graphs and use them for network vulnerability analysis. Experiments show that our approach is valid and scalable to find the possible vulnerabilities exploitation ways in networks.
Keywords :
data mining; graph theory; security of data; attack graphs; computer security; network vulnerability analysis; privilege escalation paths; scalability problems; Computer networks; Computer science; Computer security; Data mining; Information analysis; Information security; Operating systems; Performance analysis; Scalability; Taxonomy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Fuzzy Systems and Knowledge Discovery, 2007. FSKD 2007. Fourth International Conference on
Conference_Location :
Haikou
Print_ISBN :
978-0-7695-2874-8
Type :
conf
DOI :
10.1109/FSKD.2007.406
Filename :
4406353
Link To Document :
بازگشت