z-logo
open-access-imgOpen Access
Method for monitoring the sequence of implementation of attacking actions during an active analysis of the security of corporate networks
Author(s) -
Roman Kyrychok,
German Shuklin,
Zoreslava Brzhevska
Publication year - 2020
Publication title -
sučasnij zahist ìnformacìï
Language(s) - English
Resource type - Journals
ISSN - 2409-7292
DOI - 10.31673/2409-7292.2020.025258
Subject(s) - exploit , computer science , offensive , vulnerability (computing) , softmax function , dependency (uml) , sequence (biology) , process (computing) , computer security , data mining , machine learning , artificial intelligence , operations research , mathematics , biology , artificial neural network , genetics , operating system
The article proposes an approach to increase the efficiency of vulnerability validation during automatic active analysis of security of corporate networks based on control of the sequence of implementation of offensive actions (exploits) according to softmax action selection strategy using Gibbs probability distribution. At the same time, based on a practical analysis of the process of validation of vulnerabilities, the coefficient of erroneous decisions on the implementation of the exploit was introduced, which allows to dynamically change the key parameter of the Gibbs distribution - temperature, which in turn balances the probability of choosing the next attack. when implementing the validation of the identified vulnerabilities of a specific target system.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here