首页> 外文会议>2012 IEEE Conference on Technologies for Homeland Security. >Partial cuts in attack graphs for cost effective network defence
【24h】

Partial cuts in attack graphs for cost effective network defence

机译:部分削减攻击图以实现经济高效的网络防御

获取原文
获取原文并翻译 | 示例

摘要

Because of increasing vulnerabilities, maturing attack tools, and increasing dependence on computer network infrastructure, tools to support network defenders are essential. Course-of-action recommendation research has often assumed a goal of perfect network security. In reality, network administrators balance security with usability and so tolerate vulnerabilities and imperfect security. We provide realistic course-of-action decision support for network administrators by minimizing connectivity in attack graphs, by optimizing network configuration changes to separate defence goals from attackers as much as possible, even when complete security is impractical. We introduce vertex closures and closure-relation graphs in AND/OR digraphs as the underlying framework. Computing an optimal course-of-action is NP-hard but we design a polynomial-time greedy algorithm that almost always produces an optimal solution.
机译:由于漏洞的增加,攻击工具的日趋成熟以及对计算机网络基础结构的依赖性日益增加,支持网络防御者的工具至关重要。行动方针推荐研究通常假设了完美的网络安全性的目标。实际上,网络管理员会在安全性和可用性之间取得平衡,因此可以容忍漏洞并提高安全性。通过最大程度地减少攻击图中的连接性,优化网络配置更改以尽可能使防御目标与攻击者分离,即使在完全安全性不可行的情况下,我们也为网络管理员提供了切实可行的行动方案决策支持。我们在AND / OR有向图中引入了顶点闭合和闭合关系图作为基础框架。计算最优的运动过程是NP难的,但是我们设计了一个多项式时间贪婪算法,该算法几乎总是产生最优解。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号