A Distributed network risk assessment method based on attack graph

被引:0
|
作者
Yang, Tian Chi [1 ]
Fang, Ming [1 ]
Shao, Qi Feng [1 ]
机构
[1] China Coll Elect Technol, Zhengzhou, Henan Province, Peoples R China
关键词
network security risk assessment; security risk probability; the attack graph;
D O I
10.4028/www.scientific.net/AMM.241-244.2335
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Evaluating risk effectively selecting effective defence measures and defending information threats actively are the key points of resolving security problems of information system. Based on the actual requirements and status of risk assessment of information security, we integrate attack graph to apply it in studying risk assessment of information security. Firstly, focused on the uncertainty and complexity of risk assessment of information security, we integrate the technology of vulnerabilities associated with to apply it in studying risk assessment. On the other hand, since the attack path described by attack graph model is suited for the quantity data processing, and poor to the qualitative analyze, and risk is uncertain, the risk factors are quantized by the probability of attack path forming proposed in this dissertation so that the probability of atom attack are pre-treated, a risk assessment method based on attack graph model is proposed. The method Take full advantage of computing power of each host in the network, greatly shorten the attack graph generation time.
引用
收藏
页码:2335 / 2342
页数:8
相关论文
共 50 条
  • [1] Network Security Risk Assessment Method Based on HMM and Attack Graph Model
    Liu Si-chao
    Liu Yuan
    [J]. 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
  • [2] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [3] Risk Assessment Method of IoT Host Based on Attack Graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    [J]. MOBILE NETWORKS & APPLICATIONS, 2023,
  • [4] A Dynamic Risk Assessment Method Based on Bayesian Attack Graph
    Luo, Zhiyong
    Xu, Rui
    Wang, Jianming
    Zhu, Weicheng
    [J]. International Journal of Network Security, 2022, 24 (05) : 787 - 796
  • [5] Network Vulnerability Assessment based on Attack Graph
    Wang Huan
    Zhao Jianping
    Liu Dan
    Li Bo
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 542 - 545
  • [6] Multiobjective network security dynamic assessment method based on Bayesian network attack graph
    Xie, Jialiang
    Zhang, Shanli
    Wang, Honghui
    Chen, Mingzhi
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2024, 17 (01) : 38 - 60
  • [7] Network Security Risk Assessment System Based on Attack Graph and Markov Chain
    Sun, Fuxiong
    Pi, Juntao
    Lv, Jin
    Cao, Tian
    [J]. 2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910
  • [8] Heuristic Network Security Risk Based on Attack Graph
    Sun, Wei
    Li, Qianmu
    Wang, Pengchuan
    Hou, Jun
    [J]. CLOUD COMPUTING, CLOUDCOMP 2021, 2022, 430 : 181 - 194
  • [9] A Method Based on Global Attack Graph for Network Hardening
    Man, Dapeng
    Yang, Wu
    Yang, Yongtian
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4536 - 4539
  • [10] Host security assessment method based on attack graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (02): : 89 - 99