Network Vulnerability Assessment based on Attack Graph

被引:0
|
作者
Wang Huan [1 ]
Zhao Jianping [1 ]
Liu Dan [1 ]
Li Bo [1 ]
机构
[1] Changchun Univ Sci & Technol, Sch Comp Sci & Technol, Changchun, Jilin, Peoples R China
关键词
attack graph; CVSS scaling; vulnerability;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In order to identify the vulnerabilities and their relationships, a network vulnerability assessment model and method based on attack graph is proposed. The attack graph model is formally defined, and then the CVSS scaling of the vulnerability is introduced to quantify the attack overhead and return on the path. Based on the quantitative value and network connection relation, the generation algorithm of attack graph is given, and the process of generation, transfer, diffusion and aggregation of network risk is simulated. Compared with the traditional attack graph generation algorithm, the average speed is increased by 18%.
引用
收藏
页码:542 / 545
页数:4
相关论文
共 50 条
  • [1] AGQL: A Query Language for Attack Graph based Network Vulnerability Analysis
    Barik, Mridul Sankar
    [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [2] NETWORK ATTACK PATH PREDICTION BASED ON VULNERABILITY DATA AND KNOWLEDGE GRAPH
    Wang, Yifan
    Sun, Zhi
    Han, Ye
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2021, 17 (05): : 1717 - 1730
  • [3] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [4] A Distributed network risk assessment method based on attack graph
    Yang, Tian Chi
    Fang, Ming
    Shao, Qi Feng
    [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2335 - 2342
  • [5] A novel dynamic vulnerability assessment method for Industrial Control System based on vulnerability correlation attack graph
    Zhou, Ying
    Zhang, Zhiyong
    Zhao, Kejing
    Zhang, Zhongya
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [6] A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow
    Wang, Huan
    Chen, Zhanfang
    Zhao, Jianping
    Di, Xiaoqiang
    Liu, Dan
    [J]. IEEE ACCESS, 2018, 6 : 8599 - 8609
  • [7] A novel network risk assessment method based on vulnerability correlation graph
    Liu Guqing
    Wang Xintong
    Yang Jungang
    Kang Jie
    [J]. 2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 31 - 34
  • [8] Multiobjective network security dynamic assessment method based on Bayesian network attack graph
    Xie, Jialiang
    Zhang, Shanli
    Wang, Honghui
    Chen, Mingzhi
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2024, 17 (01) : 38 - 60
  • [9] Modeling active cyber attack for network vulnerability assessment
    Eom, Jung-Ho
    Han, Young-Ju
    Chung, Tai-Myoung
    [J]. FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2006 WORKSHOPS, PROCEEDINGS, 2006, 4331 : 971 - +
  • [10] Propose Vulnerability Metrics to Measure Network Secure using Attack Graph
    Al-Araji, Zaid J.
    Ahmad, Sharifah Sakinah Syed
    Abdullah, Raihana Syahirah
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 51 - 58