作者
Zaid J Al-Araji, Sharifah Sakinah Syad Ahmed, Raihana Syahirah Abdullah, Ammar Awad Mutlag, Hayder Adil Abdul Raheem, Siti Rohanah Hasan Basri
发表日期
2021/6
来源
Network Security
卷号
2021
期号
6
页码范围
13-19
出版商
MA Business
简介
An attack graph (AG) is an abstraction that represents the paths by which an attacker could break a security policy, leveraging interdependencies among discovered vulnerabilities. However, current AG implementations are inefficient on large-scale networks. The increase of the number of hosts in networks causes an increase in the time it takes to generate the AG, especially the calculation time and the complexity of determining reachability.
An attack graph (AG) is an abstraction that represents the paths by which an attacker could break a security policy, leveraging interdependencies among discovered vulnerabilities.
However, current AG implementations are inefficient on large-scale networks. The increase of the number of hosts in networks causes an increase in the time it takes to generate the AG, especially the calculation time and the complexity of determining reachability. In this article, the authors examine …
引用总数
20212022202320242471
学术搜索中的文章
ZJ Al-Araji, SSS Ahmed, RS Abdullah, AA Mutlag… - Network Security, 2021