Matrix visualization method based on state transition graph

A matrix and state technology, applied in the field of matrix visualization based on state attack and defense graph, can solve the problems of low evaluation efficiency, uncertainty, and inability to adapt to a slightly larger network, and achieve the effect of accurate calculation results

Inactive Publication Date: 2017-03-29
NANJING UNIV OF SCI & TECH
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the existing attack templates, the depth-first search strategy is used to generate network attack graphs to make a more comprehensive evaluation of the network security situation. However, the generation process of attack graphs is completely manual, and the evaluation efficiency is low and cannot adapt to larger-scale networks ( C.A.Phillips, L.P.Swiler, A Graph Based System for NetworkVulnerability Analysis, In the ACM Proceedings from the 1998 New Security Paradigms Workshop, 71-79.)
Ammann et al. adopted a method based on graph theory and introduced a monotonicity assumption, which solved the state explosion problem of the attack graph to a certain extent, but it was still difficult to apply to a slightly larger network (AmmannP, WijesekeraD, KaushikS. Scalable, Graph- based Network Vulnerability Analysis[C]Proceedings of the 9 th ACM Conference on Computer and Communications Security (CCS'02), Washington DC, ACM, 2002: 217-224.)
With the help of the existing attack graph, Pan Xiaozhong used the matrix to analyze the security of large-scale networks, and expressed the network risks through histograms, realizing the visualization of risks in large-scale networks. The probability of the vulnerability is not quantitatively calculated, but the corresponding value is given based on the description, which is uncertain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Matrix visualization method based on state transition graph
  • Matrix visualization method based on state transition graph
  • Matrix visualization method based on state transition graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0103] by figure 2 The network topology shown is taken as an example to illustrate the specific implementation steps. Such as figure 2 As shown, there are four servers in this network environment. server1 opens the Telnet service, server2 runs the web server, server3 is the FTP server, and server4 is the database server. The network firewall only allows external access to the Telnet server, and prohibits other access.

[0104] the first step, by figure 2 From the topology diagram shown and the access relationship between each host node, we can know that the reachability matrix is ​​established as follows.

[0105]

[0106] Among them, 1 indicates that the access is connected, and 0 indicates that the access is not connected.

[0107] In the second step, use the vulnerability scanning tools Nessus, ISS and SARA to scan each server node in the network system, and obtain the vulnerability set of each server node as shown in Table 1 below.

[0108] Table 1

[0109] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a matrix visualization method based on a state transition graph. The method comprises the following steps: establishing a reachable matrix according to the connectivity of all host nodes in a network topology; scanning the host nodes in a network through vulnerability scanning tools (Nessus, ISS and SARA), so that a vulnerability set for each host node is obtained; constructing the state transition graph according to the vulnerability sets of the host nodes and exploitation rules of vulnerabilities; constructing an attack path vulnerability matrix according to the state transition graph; calculating host penetration risk values of the vulnerabilities in the state transition graph based on a common vulnerability scoring system (CVSS); calculating a host vulnerability risk matrix of the state transition graph through matrix operation; and representing host vulnerability risks through a pie chart, so that a network security administrator can search for a host with the highest risk value and carry out maintenance. The method provided by the invention has the advantages that vulnerability risk information of hosts in the network can be visually and clearly described, so that a new thread of thought is provided for the visualization of risk results of the state transition graph.

Description

technical field [0001] The invention relates to the technical field of network security attack and defense visualization, in particular to a matrix visualization method based on a state attack and defense graph. Background technique [0002] With the advent of the big data era, the network is developing towards intelligence and collaboration, and multi-step combined penetration attacks have become the main form of threatening network security, which has brought great difficulties to network security administrators. Especially in recent years, there have been more and more violent problems in network security. In order to evaluate the security of the network, the research and analysis of attack-defense graph has become one of the main means. Using the attack-defense diagram to conduct security analysis on the network can improve the ability of the network system to respond to emergencies and improve network security. [0003] At present, some research results have been obtai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26
CPCH04L63/20H04L43/045H04L63/1433
Inventor 蒋薛松李千目王烁
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products