计算机科学 ›› 2023, Vol. 50 ›› Issue (9): 35-43.doi: 10.11896/jsjkx.230500025
王子博1, 张耀方1, 陈翊璐1, 刘红日1,2, 王佰玲1, 王冲华3
WANG Zibo1, ZHANG Yaofang1, CHEN Yilu1, LIU Hongri1,2, WANG Bailing1, WANG Chonghua3
摘要: 攻击路径发现是辅助网络资产安全评估的一项关键任务。现有基于智能规划的攻击路径发现方法因建模语言丰富和规划算法完备而深受安全从业者青睐,但其存在的扩展性问题不容忽视。为此,提出一种基于分层任务网络的攻击路径发现方法。具体而言,围绕网络规模逐步扩展、路径发现任务愈加复杂和安全推演场景频繁变化所引发的扩展性问题,将所提方法分解为3个阶段。第一阶段,针对路径生成性能差的问题,引入面向目标拓扑的多层级K路划分算法;第二阶段,针对领域问题描述难的问题,构建融入专家经验的路径规划分层任务网络;第三阶段,针对路径更新效率低的问题,设计应对局部信息更替的攻击路径维护方案。实验结果表明,所提方法适用于大规模网络,执行效率更高,具备良好的扩展性。
中图分类号:
[1]LALLIE H S,DEBATTISTA K,BAL J.A review of attackgraph and attack tree visual syntax in cyber security[J].Computer Science Review,2020,35:100219-100259. [2]ZENITANI K.Attack graph analysis:an explanatory guide[J].Computers & Security,2022,126:103081-103101. [3]ZANG Y C,ZHU T Y,ZHU J H,et al.Domain-independent intelligent planning technology and its application to automated penetration testing oriented attack path discovery[J].Journal of Electronics & Information Technology,2020,42(9):2095-2107. [4]OU X,GOVINDAVAJHALA S,APPEL A W.MulVAL:ALogic-based Network Security Analyzer[C]//USENIX security symposium.2005:113-128. [5]INOKUCHI M,OHTA Y,KINOSHITA S,et al.Design procedure of knowledge base for practical attack graph generation[C]//Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security.2019:594-601. [6]STAN O,BITTON R,EZRETS M,et al.Extending AttackGraphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks[J].IEEE Transactions on Dependable and Secure Computing,2022,19(3):1936-1954. [7]SAHA D.Extending logical attack graphs for efficient vulnerability analysis[C]//Proceedings of the 15th ACM Conference on Computer and Communications Security.2008:63-74. [8]GHOSH N,GHOSH S K.A planner-based approach to generate and analyze minimal attack graph[J].Applied Intelligence,2012,36:369-390. [9]GAO W L,ZHOU T Y,ZHU J H,et al.Network attack path discovery method based on bidirectional ant colony algorithm[J].Computer Science,2022,49(S1):516-522. [10]BEZAWADA B,RAY I,TIWARY K.AGBuilder:an AI tool for automated attack graph building,analysis,and refinement[C]//IFIP Annual Conference on Data and Applications Security and Privacy.Cham:Springer,2019:23-42. [11]KAYNAR K,SIVRIKAYA F.Distributed attack graph generation[J].IEEE Transactions on Dependable and Secure Computing,2015,13(5):519-532. [12]CAO N,LV K,HU C.An attack graph generation method based on parallel computing[C]//Science of Cyber Security:First International Conference.Springer International Publishing,2018:34-48. [13]LIU Y Z,CHEN Y Z,GUO K,et al.Distributed process mining and graph segmentation for network attack modeling [J].Journal of Chinese Mini-Micro Computer Systems,2020,41(8):1732-1740. [14]SHAO T H,ZHANG H J,CHENG K,et al.Review of replanning in hierarchical task network [J].Journal of Systems Engineering and Electronics,2020,42(12):2833-2846. [15]HERRMANN J,KHO J,UÇAR B,et al.Acyclic partitioning of large directed acyclic graphs[C]//2017 17th IEEE/ACM International Symposium on Cluster,Cloud and Grid Computing(CCGRID).IEEE,2017:371-380. [16]CHEN F,ZHANG Y,SU J S,et al.Two Formal Analyses of Attack Graphs [J].Journal of Software,2010,21(4):838-848. [17]Simple Hierarchical Ordered Planner(SHOP)[EB/OL].https://www.cs.umd.edu/projects/shop/. [18]Fast Forward(FF) [EB/OL].https://fai.cs.uni-saarland.de/hoffmann/ff.html. [19]SGPlan(Version 5.0)[EB/OL].https://wah.cse.cuhk.edu.hk/wah/programs/SGPlan/. [20]Fast Downward(FD)[EB/OL].https://github.com/aibasel/downward. [21]Partial Order Planning Forwards(POPF)(Version 2.0) [EB/OL].https://nms.kcl.ac.uk/planning/software/popf.html. [22]Heavy-edge matching [EB/OL] https://github.com/loukasa/graph-coarsening. |
|