DocumentCode :
247140
Title :
Automatic Generation Algorithm of Penetration Graph in Penetration Testing
Author :
Xue Qiu ; Shuguang Wang ; Qiong Jia ; Chunhe Xia ; LiangShuang Lv
Author_Institution :
Beijing Key Lab. of Network Technol., Beihang Univ., Beijing, China
fYear :
2014
fDate :
8-10 Nov. 2014
Firstpage :
531
Lastpage :
537
Abstract :
Penetration graph is a kind of attack graph which is widely used in penetration testing. It is an import tool to analyze security vulnerabilities in the network. However, the previous research on the generation methods of penetration graph have met a lot of challenges. Some methods are out of date and not applicable for practical scenarios, some may possibly leave out the import attack paths, some do not consider the probability of exploitation of each attack path and some failed to solve the problem of circle path and combination exploitation. We propose an automatic generation algorithm of penetration graph that optimizes the network topology before generating the penetration graph, which can reduce the redundant information effectively. We combine the penetration graph generation method with the CVSS (Common Vulnerability Scoring System) information together, increase the reliability of each attack path. Experiment result shows that the method can generates multi-path correctly and effectively, which can clearly show the structure of network, facilitates the testers´ analysis of the target network, and provides reference for executing penetration testing.
Keywords :
computer network security; graph theory; telecommunication network topology; CVSS; Common Vulnerability Scoring System; attack graph; attack path reliability; automatic generation algorithm; network structure; network topology optimization; penetration graph; penetration testing; security vulnerabilities analysis; target network tester analysis; Educational institutions; Laboratories; Measurement; Network topology; Ports (Computers); Security; Automatic generation; Penetration graph; Penetration testing; matrix; vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2014 Ninth International Conference on
Conference_Location :
Guangdong
Type :
conf
DOI :
10.1109/3PGCIC.2014.104
Filename :
7024641
Link To Document :
بازگشت