Font Size: a A A

Network Threat Path Generation And Analysis Technology Based On Graphic Data

Posted on:2020-05-08Degree:MasterType:Thesis
Country:ChinaCandidate:B T YuanFull Text:PDF
GTID:2518306548993769Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
The network threat path is a description of the attack sequence that causes the change of network security state.The generation of threat path has the ability to actively predict the network security state before the occurrence of network security events,which is of great significance for building a secure network environment.At present,threat path generation technology mainly faces the problems of high human cost,high time complexity,low scalability and poor visualization.At the same time,when analyzing threat path,the current method could not calculate the change of risk value of threat path in time dimension.Aiming at the problems of low scalability and poor visualization in the generation of threat path,this paper designs a data storage method of network node based on graph.The detected network node data is abstracted into vertex and relation edge in the graph structure,and the graph database is used to realize efficient query and visual graph storage.In order to solve the problems of high cost of manpower and high complexity of time in traditional threat path generation methods,this paper designs a network threat path generation algorithm based on the graphic network node data.With the help of the graphic data,the algorithm optimizes and eliminates a large number of table connections and resource consumption problems in the process of path generation.Finally,in order to solve the problem of calculating the change of risk value of threat path in time,this paper designs a threat path evaluation method based on vulnerability life cycle.The change of vulnerability threat score and availability score is calculated,which lead to the change of risk value of threat path.
Keywords/Search Tags:Threat Path, Graphic Storage, Vulnerability Life Cycle, Risk Value Assessment
PDF Full Text Request
Related items