Study on the method to generate network attack graphs

被引:0
|
作者
Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China [1 ]
机构
来源
Gaojishu Tongxin | 2006年 / 4卷 / 348-352期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Aiming at the requirement of network security analysis, a flexible method to generate attack graph is presented. After analyzing network security attributes including the host, user privilege, connection relation, etc., the network security model is built, and the model could describe the network security status. A forward-search, breadth-first algorithm is used to produce attack route, and the tools Graphviz isutilized to generate the attack graph. The experimental rersults validate that our method is feasible.
引用
收藏
相关论文
共 50 条
  • [1] A New Method to Generate Attack Graphs
    Xie, Anming
    Chen, Guodong
    Wang, Yonggang
    Chen, Zhong
    Hu, Jianbin
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 401 - 406
  • [2] An effective method to generate attack graph
    Zhang, T
    Hu, MZ
    Li, D
    Sun, L
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3926 - 3931
  • [3] A novel method of constituting network security policy based on attack graphs
    Ma, Junchun
    Wang, Yongjun
    Sun, Jiyin
    Ma, J. (chenshan1223@126.com), 1600, Inst. of Scientific and Technical Information of China (22): : 374 - 381
  • [4] A Generation Method of Network Security Hardening Strategy Based on Attack Graphs
    Zhao, Chao
    Wang, Huiqiang
    Lin, Junyu
    Lv, Hongwu
    Zhang, Yushu
    INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2015, 12 (01) : 45 - 61
  • [5] Network Security Evaluation Method via Attack Graphs and Fuzzy Cognitive Maps
    Diamah, Aodah
    Mohammadian, Masoud
    Balachandran, Bala M.
    INTELLIGENT DECISION TECHNOLOGIES (IDT'2012), VOL 2, 2012, 16 : 433 - 440
  • [6] Multiple coordinated views for network attack graphs
    Noel, S
    Jacobs, M
    Kalapa, P
    Jajodia, S
    IEEE Workshop on Visualization for Computer Security 2005, Proceedings, 2005, : 99 - 106
  • [7] Applying Attack Graphs to Network Security Metric
    Xie, Anming
    Wen, Weiping
    Zhang, Li
    Hu, Jianbin
    Chen, Zhong
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 427 - +
  • [8] Fast network attack modeling and security evaluation based on attack graphs
    Kotenko, Igor
    Chechulin, Andrey
    1600, River Publishers (03): : 27 - 46
  • [9] An intelligent method to generate liaison graphs for truss structures
    Cao, Hao
    Mo, Rong
    Wan, Neng
    Deng, Qi
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART B-JOURNAL OF ENGINEERING MANUFACTURE, 2018, 232 (05) : 889 - 898
  • [10] Towards Using Boolean Operators on Graphs to Generate Network Topologies
    Lima, Nadja J. da S.
    Araujo, Danilo R. B.
    Martins-Filho, Joaquim F.
    Bastos-Filho, Carmelo J. A.
    2015 SBMO/IEEE MTT-S INTERNATIONAL MICROWAVE AND OPTOELECTRONICS CONFERENCE (IMOC), 2015,