Font Size: a A A

Research On Attack Chain Construction Method Based On Vulnerability Combination

Posted on:2022-03-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y ChengFull Text:PDF
GTID:2518306353484594Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Vulnerabilities exist not only in the system design and implementation,but also in all aspects of system operation and management.Using single vulnerability to attack the system has little impact,but the combination of vulnerabilities will cause serious harm to the system,even some unknown harm.Many researchers hope to find a way to analyze the combination of vulnerabilities.In this paper,this paper propose a new attack chain construction method based on vulnerability combination.According to the characteristics of vulnerabilities and the relationship between them and combined with the characteristic that attackers will not use super long attack chain in order to hide themselves,the vulnerability database of the system is constructed firstly,a method of vulnerability description is designed.And then the vulnerabilities are generalized and clustered.Then the idea of combination test is used to combine the vulnerabilities and build the attack chain.This paper also propose a method of vulnerability combination using answer set programming.Aiming at this method,we design an environment with attacker and target system to verify our method.Next,this paper design an experimental simulation platform including the attacker and target system and carry out experiments.The author scan the vulnerabilities on the target system,cluster them,combine them,and construct the attack chain.The attack the target system according to the attack chain.The experiment verifies the effectiveness of the attack chain construction method based on vulnerability combination.In the process of the experiment,this paper also found that there are still some areas that need to be optimized in the clustering and combination of the proposed method.In the end,this paper pointed out the future prospects.
Keywords/Search Tags:Vulnerability combination, Attack graph, Attack chain, Clustering, Answer set programming(ASP)
PDF Full Text Request
Related items