[PDF][PDF] Finding optimal attack path using attack graphs: a survey

S Khaitan, S Raheja - International Journal of Soft Computing and …, 2011 - Citeseer
International Journal of Soft Computing and Engineering, 2011Citeseer
As the traditional methods, the result of vulnerability scanning can't directly reflect complex
attack routes existing in network, so the concept of attack graph comes. After analyzing host
computer, devices link relation and the characteristic of attack, the model of network security
status was built. Attack graphs are one of the important tools for analyzing security. A lot of
research has been done on issues such as scalable and time efficient ways of generation of
attack graphs. The intent of this paper is to study different ways to generate an attack graph …
Abstract
As the traditional methods, the result of vulnerability scanning can’t directly reflect complex attack routes existing in network, so the concept of attack graph comes. After analyzing host computer, devices link relation and the characteristic of attack, the model of network security status was built. Attack graphs are one of the important tools for analyzing security. A lot of research has been done on issues such as scalable and time efficient ways of generation of attack graphs. The intent of this paper is to study different ways to generate an attack graph and to provide future scope for research on these attack graphs.
Citeseer
以上显示的是最相近的搜索结果。 查看全部搜索结果