• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Chen, B. (Chen, B..) [1] | Liu, Y. (Liu, Y..) [2] | Li, S. (Li, S..) [3] | Gao, X. (Gao, X..) [4]

Indexed by:

Scopus

Abstract:

With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack behaviors and timely identification and pre-judgment of attack intentions are important components of security risks. However, the attack behavior in the network presents complexity, multi-step and uncertainty, which brings new technical challenges to attack intent analysis. Aiming at the problem that the attack intention of multi-step complex attack is difficult to identify, this paper proposes an attack intention analysis method based on attack path graph. Firstly, aiming at the multi-step complex attack behavior analysis problem, the key asset assessment technology is used to find out the key assets in the network system, and the hypothetical attack intention is generated according to the security protection requirements of the network system. Then, it is difficult to manually construct the attack path map in the large-scale network, and the automatic generation of the attack path map is realized. Finally, a method of network attack intent identification is proposed and a calculation method of attack intent probability is designed, which improves the efficiency and accuracy of attack intent recognition. © 2019 Association for Computing Machinery.

Keyword:

Attack Intention; Attack Path Graph; Key Asset; Vulnerability; Vulnerability Exploitation

Community:

  • [ 1 ] [Chen, B.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China
  • [ 2 ] [Chen, B.]Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou, Fujian, China
  • [ 3 ] [Liu, Y.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China
  • [ 4 ] [Liu, Y.]Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou, Fujian, China
  • [ 5 ] [Li, S.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China
  • [ 6 ] [Li, S.]Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou, Fujian, China
  • [ 7 ] [Gao, X.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China
  • [ 8 ] [Gao, X.]Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou, Fujian, China

Reprint 's Address:

  • [Liu, Y.]College of Mathematics and Computer Science, Fuzhou UniversityChina

Show more details

Related Keywords:

Related Article:

Source :

ACM International Conference Proceeding Series

Year: 2019

Page: 97-102

Language: English

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 1

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:270/10044787
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1