Automatic generation algorithm of penetration graph in penetration testing

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Penetration graph is a kind of attack graph which is widely used in penetration testing. It is an import tool to analyze security vulnerabilities in the network. However, the previous research on the generation methods of penetration graph have met a lot of challenges. Some methods are out of date and not applicable for practical scenarios, some may possibly leave out the import attack paths, some do not consider the probability of exploitation of each attack path and some failed to solve the problem of circle path and combination exploitation. We propose an automatic generation algorithm of penetration graph that optimizes the network topology before generating the penetration graph, which can reduce the redundant information effectively. We combine the penetration graph generation method with the CVSS (Common Vulnerability Scoring System) information together, increase the reliability of each attack path. Experiment result shows that the method can generates multi-path correctly and effectively, which can clearly show the structure of network, facilitates the testers' analysis of the target network, and provides reference for executing penetration testing.

Original languageEnglish
Title of host publicationProceedings - 2014 9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2014
EditorsLeonard Barolli, Jin Li, Marek R. Ogiela, Fatos Xhafa, Tomoki Yoshihisa
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages531-537
Number of pages7
ISBN (Electronic)9781479941711
DOIs
StatePublished - 27 Jan 2014
Event9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2014 - Guangzhou, Guangdong, China
Duration: 8 Nov 201410 Nov 2014

Publication series

NameProceedings - 2014 9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2014

Conference

Conference9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2014
Country/TerritoryChina
CityGuangzhou, Guangdong
Period8/11/1410/11/14

Keywords

  • Automatic generation
  • Penetration graph
  • Penetration testing
  • matrix
  • vulnerability

Fingerprint

Dive into the research topics of 'Automatic generation algorithm of penetration graph in penetration testing'. Together they form a unique fingerprint.

Cite this