A vulnerability attack graph generation method based on scripts

  • Authors:
  • Bo Han;Qing Wang;Fajiang Yu;Xianda Zhang

  • Affiliations:
  • International School of Software, Wuhan University, P.R. China;International School of Software, Wuhan University, P.R. China;School of Computer, Wuhan University, P.R. China;School of Geodesy and Geomatics, Wuhan University, P.R. China

  • Venue:
  • ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

The vulnerability attack graph is an important method for prevention of network attacks. However, the huge amount of vulnerability has caused great difficulties for attack graph generation. By using the general search methods, we often retrieve many unrelated vulnerabilities from database, difficult to locate the true exploits of points. In this paper, we proposed an attack graph generation method based on scripts. It applied text mining technology to analyze in-depth vulnerability information. We have got a relatively small range of vulnerability. By combinations of these related vulnerability, we generated the attack graphs. The approach helps attack graph play better defense functionality.