ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2019, Vol. 56 ›› Issue (5): 929-941.doi: 10.7544/issn1000-1239.2019.20190012

Special Issue: 2019智能网络理论与关键技术专题

Previous Articles     Next Articles

Intelligent and Efficient Method for Optimal Penetration Path Generation

Wang Shuo1,3, Wang Jianhua1,2, Tang Guangming1, Pei Qingqi3, Zhang Yuchen1, Liu Xiaohu1   

  1. 1(Zhengzhou Information Science and Technology Institute, Zhengzhou 450001); 2(Electronic Technology Institute of Air Force, Beijing 100195); 3(State Key Laboratory of Integrated Services Networks (Xidian University), Xi’an 710071)
  • Online:2019-05-01

Abstract: Considering the insider and unknown attack, to further improve the efficiency, an intelligent-efficient method for generating the optimal penetration path is put forward. Firstly, we define the two-layer threat penetration graph(TLTPG), where the lower layer is called host threat penetration graph(HTPG) and the upper layer is called network threat penetration graph(NTPG). Then, based on knowledge graph, we build the host resource knowledge graph(HRKG), which is used to generate the HTPG intelligently and efficiently. Further, utilizating the HTPG, we design the NTPG generation algorithm based on penetration information exchange. Finaly, we describe the algorithm of optimal penetration path generation by using the TLTPG. Experimental results show that the proposed method can improve the efficiency of generating the optimal penetration path under the condition that the insider and unknown attack are considered.

Key words: generating the optimal penetration path, intelligent-efficient, two-layer threat penetration graph, knowledge graph, penetration information exchange

CLC Number: