A Flexible Approach to Measuring Network Security Using Attack Graphs

被引:0
|
作者
Chen Feng [1 ]
Su Jin-Shu [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Hunan, Peoples R China
来源
PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY | 2008年
关键词
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
The previous approaches to measuring network security are most based on the hypothesis that the related source data can be known well and truly. But in practice, it is very difficult to obtain all the related accurate source data [22]. In this paper, we propose a flexible approach based on attack graphs to measuring security of crucial resources in vulnerable network, which could bring out the accurate result of measuring network security with incomplete input data. Another key improvement is presenting the backward iterative algorithm to solve the problem of cyclic attack paths in measuring security using attack graphs. At the same time, the simulation experiment demonstrates the algorithm can be applied to the large attack graphs.
引用
收藏
页码:426 / 431
页数:6
相关论文
共 50 条
  • [1] Toward Measuring Network Security Using Attack Graphs
    Wang, Lingyu
    Singhal, Anoop
    Jajodia, Sushil
    QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, 2007, : 49 - 54
  • [2] Measuring the overall security of network configurations using attack graphs
    Wang, Lingyu
    Singhal, Anoop
    Jajodia, Sushil
    DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 98 - +
  • [3] Measuring Security Risk of Networks Using Attack Graphs
    Noel, Steven
    Jajodia, Sushil
    Wang, Lingyu
    Singhal, Anoop
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2010, 1 (01): : 113 - 123
  • [4] Measuring Security Risk of Networks Using Attack Graphs: A Critique
    Goubanova, Svetlana
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2011, 2 (01): : I - iii
  • [5] Applying Attack Graphs to Network Security Metric
    Xie, Anming
    Wen, Weiping
    Zhang, Li
    Hu, Jianbin
    Chen, Zhong
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 427 - +
  • [6] Fast network attack modeling and security evaluation based on attack graphs
    Kotenko, Igor
    Chechulin, Andrey
    1600, River Publishers (03): : 27 - 46
  • [7] Two Scalable Approaches to Analyzing Network Security Using Compact Attack Graphs
    Chen, Feng
    Tu, Ri
    Zhang, Yi
    Su, Jinshu
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 90 - 94
  • [8] An Approach for Security Assessment of Network Configurations using Attack Graph
    Ghosh, Nirnay
    Ghosh, S. K.
    2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 283 - 288
  • [9] GENERATING NETWORK ATTACK GRAPHS FOR SECURITY ALERT CORRELATION
    Zhang, Shaojun
    Li, Jianhua
    Chen, Xiuzhen
    Fan, Lei
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 220 - 225
  • [10] Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs
    Durkota, Karel
    Lisy, Viliam
    Kiekintveld, Christopher
    Bosansky, Branislav
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 1773 - 1774