Title
Mining Privilege Escalation Paths for Network Vulnerability Analysis
Abstract
Computer security is an important issue in our society. In order to prevent computer systems and networks from attacks, we should try to find flaws in these systems and evaluate them. Generally researchers and red teams use attack graphs to perform network vulnerability analysis, which tend to suffer scalability problems. In this paper we put forward a mining method to generate privilege escalation paths in networks. With these privilege escalation paths we create net privilege graphs and use them for network vulnerability analysis. Experiments show that our approach is valid and scalable to find the possible vulnerabilities exploitation ways in networks.
Year
DOI
Venue
2007
10.1109/FSKD.2007.406
FSKD (4)
Keywords
Field
DocType
possible vulnerability,mining privilege escalation paths,important issue,mining method,privilege escalation path,attack graphs,computer security,computer system,privilege escalation paths,attack graph,network vulnerability analysis,data mining,graph theory,exploitation way,privilege graph,scalability problems,security of data,vulnerability analysis
Vulnerability (computing),Computer security,Computer science,Asset (computer security),Privilege escalation,Vulnerability assessment,Exploit,Vulnerability management,Scalability,Vulnerability
Conference
Volume
ISBN
Citations 
4
978-0-7695-2874-8
0
PageRank 
References 
Authors
0.34
8
3
Name
Order
Citations
PageRank
Baowen Zhang142.31
William Zhu2967.08
Zhi Xue3588.03