A Distributed network risk assessment method based on attack graph

被引:0
|
作者
Yang, Tian Chi [1 ]
Fang, Ming [1 ]
Shao, Qi Feng [1 ]
机构
[1] China Coll Elect Technol, Zhengzhou, Henan Province, Peoples R China
关键词
network security risk assessment; security risk probability; the attack graph;
D O I
10.4028/www.scientific.net/AMM.241-244.2335
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Evaluating risk effectively selecting effective defence measures and defending information threats actively are the key points of resolving security problems of information system. Based on the actual requirements and status of risk assessment of information security, we integrate attack graph to apply it in studying risk assessment of information security. Firstly, focused on the uncertainty and complexity of risk assessment of information security, we integrate the technology of vulnerabilities associated with to apply it in studying risk assessment. On the other hand, since the attack path described by attack graph model is suited for the quantity data processing, and poor to the qualitative analyze, and risk is uncertain, the risk factors are quantized by the probability of attack path forming proposed in this dissertation so that the probability of atom attack are pre-treated, a risk assessment method based on attack graph model is proposed. The method Take full advantage of computing power of each host in the network, greatly shorten the attack graph generation time.
引用
收藏
页码:2335 / 2342
页数:8
相关论文
共 50 条
  • [21] Generation and Risk Analysis of Network Attack Graph
    Prasad, Keshav
    Kumar, Santosh
    Negi, Anuradha
    Mahanti, Aniket
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 507 - 516
  • [22] A network attack path prediction method using attack graph
    Liu, Xuguang
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020,
  • [23] Computer network security evaluation method based on improved attack graph
    Li, Zhaocui
    Liu, Huichuan
    Wu, Chunyan
    [J]. Journal of Cyber Security Technology, 2022, 6 (04) : 201 - 215
  • [24] A Logic-based Attack Graph for Analyzing Network Security Risk Against Potential Attack
    Yi, Feng
    Cai, Huang Yi
    Xin, Fu Zheng
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2018,
  • [25] Psychological assessment method based on heterogeneous graph network
    Jin, Zhi-Gang
    Su, Ren-Jun
    Zhao, Xiao-Fang
    [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2024, 54 (04): : 1078 - 1085
  • [26] Exploring risk flow attack graph for security risk assessment
    Dai, Fangfang
    Hu, Ying
    Zheng, Kangfeng
    Wu, Bin
    [J]. IET INFORMATION SECURITY, 2015, 9 (06) : 344 - 353
  • [27] Research on computer network attack modeling based on attack graph
    Wang, Guo-Yu
    Wang, Hui-Mei
    Chen, Zhi-Jie
    Xian, Ming
    [J]. Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (04): : 74 - 80
  • [28] Risk assessment method of power plant industrial control information security based on Bayesian attack graph Systems
    Xie, Jianbo
    Sun, Keda
    Lei, Xubing
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2021, 17 (04) : 529 - 541
  • [29] Research on risk assessment technology of industrial control system based on attack graph
    Zou, Zhenwan
    Wang, Di
    Yang, Huiting
    Hou, Yingsa
    Yang, Yandong
    Xu, Wenlu
    [J]. PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 2420 - 2423
  • [30] Risk Assessment and Analysis Through Population-Based Attack Graph Modelling
    Alhomidi, Mohammed
    Reed, Martin
    [J]. 2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 19 - 24