A New Approach for Network Vulnerability Analysis

被引:0
|
作者
Vu, Hai L. [1 ]
Khaw, Kenneth K. [1 ]
Chen, T. Y. [1 ]
Kuo, Fei-Ching [1 ]
机构
[1] Swinburne Univ Technol, Fac ICT, CAIA, POB 218, Melbourne, Vic 3122, Australia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose in this paper a novel approach to analyze network vulnerability and to obtain a quantitative value representing the level of security achieved in an arbitrary network. Unlike previous graph-based algorithms that generate attack trees (or graphs) to cover all possible sequences of vulnerabilities and therefore are not scalable, our method utilizes the attack graph's principles, but directly analyzes and produces the desired security measure for a network without building the actual attack graph. The proposed approach relies on a unique evaluation of vulnerability metric defined in this paper and is demonstrated through an example of a network that provides voice over IP services.
引用
收藏
页码:189 / +
页数:2
相关论文
共 50 条
  • [1] A New Approach for Network Vulnerability Analysis
    Vu, Hai L.
    Khaw, Kenneth K.
    Chen, Tsong Yueh
    [J]. COMPUTER JOURNAL, 2015, 58 (04): : 878 - 891
  • [2] A Novel Approach for Network Vulnerability Analysis in IIoT
    Sudhakar, K.
    Senthilkumar, S.
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 45 (01): : 263 - 277
  • [3] The stochastic approach in road network vulnerability analysis
    Bil, Michal
    Vodak, Rostislav
    [J]. SAFETY AND RELIABILITY: METHODOLOGY AND APPLICATIONS, 2015, : 929 - 932
  • [4] Worldwide aviation network vulnerability analysis: a complex network approach
    Tran, Q. H. Anh
    Namatame, Akira
    [J]. EVOLUTIONARY AND INSTITUTIONAL ECONOMICS REVIEW, 2015, 12 (02) : 349 - 373
  • [5] Worldwide aviation network vulnerability analysis: a complex network approach
    Q. H. Anh Tran
    Akira Namatame
    [J]. Evolutionary and Institutional Economics Review, 2015, 12 (2) : 349 - 373
  • [6] Topological Vulnerability Analysis: A Powerful New Approach For Network Attack Prevention, Detection, and Response
    Jajodia, Sushil
    Noel, Steven
    [J]. ALGORITHMS, ARCHITECTURES AND INFORMATION SYSTEMS SECURITY, 2009, 3 : 285 - 305
  • [7] A Continuum Modeling Approach for Network Vulnerability Analysis at Regional Scale
    Ho, H. W.
    Sumalee, Agachai
    Lam, William H. K.
    Szeto, W. Y.
    [J]. 20TH INTERNATIONAL SYMPOSIUM ON TRANSPORTATION AND TRAFFIC THEORY (ISTTT 2013), 2013, 80 : 846 - 859
  • [8] Vulnerability Analysis for Network Connectivity: A Prioritizing Critical Area Approach
    Liu, Shumei
    Yu, Yao
    Guo, Lei
    Yeoh, Phee Lep
    Vucetic, Branka
    Li, Yonghui
    [J]. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [9] Power Network Component Vulnerability Analysis: A Machine Learning Approach
    Anand, Harsh
    Darayi, Mohamad
    [J]. BIG DATA, IOT, AND AI FOR A SMARTER FUTURE, 2021, 185 : 73 - 80
  • [10] A Quantitative Approach for Vulnerability Analysis of Urban Metro Network System
    Wang, Zhiru
    Su, Guofeng
    Chen, Jianguo
    [J]. 2015 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE THEORY, SYSTEMS AND APPLICATIONS (CCITSA 2015), 2015, : 5 - 9