Страница публикации

UnProVET: Using Explicit Constraint Propagation to Construct Attack Graphs

Авторы: Gorbatenko D., Semenov A., Kochemazov S.

Журнал: Proc. 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)

Том:

Номер:

Год: 2019

Отчётный год: 2019

Издательство:

Местоположение издательства:

URL:

Аннотация: One of the important problems in network security consists in the construction and analysis of attack graphs which represent all possible attacks a malefactor can carry out within a specific computer network. In this paper we describe the software system for constructing such attack graphs. The system is based on the constraint propagation mechanisms which are very close to that employed by the algorithms for solving Constraint Satisfaction Problem (CSP) and its variants. Unlike several other known software systems for attack graph generation it employs explicit constraint propagation implemented using special data structures. The computational experiments show that the system has good performance and outperforms the competition in certain scenarios.

Индексируется WOS: 1

Индексируется Scopus: 1

Индексируется РИНЦ: 0

Публикация в печати: 0

Добавил в систему: