A Network Security Risk Computation Approach Based on Attack Graphs

Article Preview

Abstract:

At present, with the rapid development of computer technology and network communication technology, and the Internet computer network application is increasingly wide and deep. Explore the scientific, reasonable and practical calculation method of the network security risk has become a hotspot in the research of network security, and a lot of research results have been reached. But because of the complexity of the network security risk calculation, there are still many challenges. Based on the shortcomings of the traditional network security risk calculation method, this paper mainly studies network security risk calculation method based on attack graph.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3174-3177

Citation:

Online since:

September 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Feng Cheng, Sebastian Roschke. An Integrated Network Scanning Tool for Attack Graph Construction[C]. Proceedings of the 6th international conference on Advances in grid and pervasive computing, Oulu, Finland, 2011: 138-147.

DOI: 10.1007/978-3-642-20754-9_15

Google Scholar

[2] L. Wang, C. Yao, A. Singhal, and S. Jajodia. Interactive Analysis of Attack Graphs Using Relational Queries[C]. Proceedings of 20th IFIP WG 11. 3 Working Conference on Data and Applications Security, 2006: 119–132.

DOI: 10.1007/11805588_9

Google Scholar

[3] Hong Chen, Ninghui Li. Towards Analyzing Complex Operating System Access Control Configurations[C]. Proceeding of the 15th ACM symposium on Access control models and technologies, Pittsburgh, USA, 2010: 13-22.

DOI: 10.1145/1809842.1809848

Google Scholar

[4] Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu, Edmund M. Clarke, Jeannette M. Wing. Ranking Attack Graphs[C]. RAID, 2006: 127-144.

DOI: 10.1007/11856214_7

Google Scholar