Страница публикации

UnProVET: Using Explicit Constraint Propagation to Construct Attack Graphs

Тип публикации: Статья в журнале

Тип материала: Текст

Авторы: Gorbatenko D., Semenov A., Kochemazov S.

Журнал: IEEE: Proc. 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)

Язык публикации: english

Серия книг: IEEE

Номера страниц: 1199-1204

Количество страниц: 6

Год публикации: 2019

Отчетный год: 2019

DOI: 10.23919/MIPRO.2019.8756915

Аннотация: One of the important problems in network security consists in the construction and analysis of attack graphs which represent all possible attacks a malefactor can carry out within a specific computer network. In this paper we describe the software system for constructing such attack graphs. The system is based on the constraint propagation mechanisms which are very close to that employed by the algorithms for solving Constraint Satisfaction Problem (CSP) and its variants. Unlike several other known software systems for attack graph generation it employs explicit constraint propagation implemented using special data structures. The computational experiments show that the system has good performance and outperforms the competition in certain scenarios.

Индексируется WOS: Q5

Индексируется Scopus: Нет

Индексируется УБС: Нет

Индексируется РИНЦ: Да

Индексируется ВАК: Нет

Индексируется CORE: Нет