Study on the method to generate network attack graphs

被引:0
|
作者
Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China [1 ]
机构
来源
Gaojishu Tongxin | 2006年 / 4卷 / 348-352期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Aiming at the requirement of network security analysis, a flexible method to generate attack graph is presented. After analyzing network security attributes including the host, user privilege, connection relation, etc., the network security model is built, and the model could describe the network security status. A forward-search, breadth-first algorithm is used to produce attack route, and the tools Graphviz isutilized to generate the attack graph. The experimental rersults validate that our method is feasible.
引用
收藏
相关论文
共 50 条
  • [41] Using Bounded Binary Particle Swarm Optimization to Analyze Network Attack Graphs
    Sairam, Ashok Singh
    Verma, Sagar Kumar
    ICDCN'18: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2018,
  • [42] Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs
    Cao, Chen
    Yuan, Lun-Pin
    Singhal, Anoop
    Liu, Peng
    Sun, Xiaoyan
    Zhu, Sencun
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 : 330 - 348
  • [43] A Method Based on Global Attack Graph for Network Hardening
    Man, Dapeng
    Yang, Wu
    Yang, Yongtian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4536 - 4539
  • [44] A Method of Evaluating Network Attack Probability based on TWDS
    Huang, Zhengxing
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1238 - 1243
  • [45] Research of Detection Method of Server Network Storm Attack
    Lang Liao
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2015, 6 : 48 - 51
  • [46] Analysis method for network-based attack scenarios
    Luo, T.J.
    Xu, H.Z.
    Dong, Z.Q.
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2001, 22 (04):
  • [47] An Network Attack Modeling Method Based on MLL-AT
    Yan Fen
    Yin Xinchun
    Huang Hao
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 470 - 473
  • [48] Design Method for Virtual Network Attack and Defense Platform
    Wang Fangnian
    Peng Gang
    Che Wanfang
    Niu Cong
    Bai Yun
    Zhu Genbiao
    CONFERENCE ON MODELING, IDENTIFICATION AND CONTROL, 2012, 3 : 335 - 340
  • [49] Network Attack Prediction Method Based on Threat Intelligence
    Wang, Junshe
    Yi, Yuzi
    Zhang, Hongbin
    Cao, Ning
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 151 - 160
  • [50] A Covert Network Attack Detection Method Based on LSTM
    Nie, Junke
    Ma, Peng
    Wang, B. O.
    Su, Yang
    PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 1690 - 1693