Bug attack graph generation method based on script

An attack graph and vulnerability technology, applied in the field of script-based vulnerability attack graph generation, to achieve the effect of easy intelligent processing

Inactive Publication Date: 2013-10-23
CHINA INFORMATION TECH SECURITY EVALUATION CENT +1
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of computer and Internet technology, the network has become an indispensable part of people's daily produc...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bug attack graph generation method based on script
  • Bug attack graph generation method based on script
  • Bug attack graph generation method based on script

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention is further described as follows in conjunction with accompanying drawings and embodiments.

[0039] like figure 1 Shown is an embodiment of a method for generating a script-based vulnerability attack graph, comprising the following steps:

[0040] A. Generate attack script: propose an attack script describing the attack path, and the generation process of the attack map starts from the step A to generate the vulnerability attack script;

[0041] B. Extract keywords: extract a certain number of keywords according to the attack script; this keyword can indeed identify the content of the attack script, and has the ability to distinguish the attack script from other texts. The number should not be too many, but the content of the keywords It can be far richer than several keywords in traditional queries;

[0042] C. Calculate the correlation between vulnerability information and keywords: calculate the vulnerability database The TF-IDF weight betwe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a bug attack graph generation method based on a script, and belongs to the technical field of computer information security. The method comprises the steps of: generating an attack script, extracting a key word, calculating relevancy between bug information and key word, generating a candidate bug set, and performing permutation and combination on candidate bugs to obtain an attack graph. The method has the advantages that the bug information indefinitely described by characters is definite to facilitate intelligent processing of a computer system on bug record data, the method is different from inquiry based on common keyword matching, the relevancy between the bugs and the script is quantitatively judged by a TF-IDF (term frequency-inverse document frequency) algorithm, interference information in a bug library is removed effectively, and the complexity of the attack graph is greatly reduced. The method can mine an implied mode and a rule between the bug data, and provides a foundation for further application of the bug data.

Description

technical field [0001] The invention relates to a method for generating a script-based vulnerability attack graph, which belongs to the technical field of computer information security. Background technique [0002] With the continuous development of computer and Internet technology, the network has become an indispensable part of people's daily production and life, but at the same time, these information technologies not only provide convenient shared resources, but also bring various Security Risk. Therefore, information security has become the focus of great attention to maintain the prosperity and stability of the country and society. With the continuous development and improvement of today's security technology, it is basically impossible to successfully invade the information network by using a single vulnerability. Today's vulnerability attacks often use multiple hosts, multiple services, and vulnerabilities in multiple types of operating systems. Permutation and co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
Inventor 吴世忠赵向辉刘晖易锦刘彦钊张磊刘林吴润浦李娟彭涛韩波
Owner CHINA INFORMATION TECH SECURITY EVALUATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products