Network security analysis based on host-security-group

Z Shang-Qi, XU Guo-Qing… - Journal of Beijing …, 2012 - journal.bupt.edu.cn
A simple, flexible, and efficient method is proposed to generate host based attack graph.
Based on this generating algorithm, the concept of 'host-security-group'is put forward, and …

[PDF][PDF] Attack Graph Generation with Implementation in Network Security

TAO ZHANG, HU MING-ZENG… - Proceeding of WESEAS …, 2007 - Citeseer
As an important method to analyze the security states of computer network, the generation of
network attack graph is a hot topic in this domain. After analyzing network vulnerabilities …

Network security assessment based on full host-based attack graph

X Wang, T Zhou, J Zhu - … of the 2020 International Conference on …, 2020 - dl.acm.org
Network security assessment is an important method of evaluating network security. The
existing researches of network security assessment have the problem that the method is not …

[PDF][PDF] Network Security Risk Assessment Based on Attack Graph.

L Xie, X Zhang, J Zhang - J. Comput., 2013 - jcomputers.us
In order to protect the network and evaluate the network security risks automatically, a new
multi-agents risk assessment model based on attack graph (MRAMBAG) is presented. First …

A method based on global attack graph for network hardening

D Man, Y Wu, Y Yang - 2008 4th International Conference on …, 2008 - ieeexplore.ieee.org
In order to improve the overall security of networks, a method of making strategies for
network hardening based on global attack graphs is proposed. This method calculates the …

Attack graph algorithm in the application of intrusion detection system

L Zhiyong, Y Bo, X Jiazhong, Y Guixin… - International Journal of …, 2013 - earticle.net
In order to discover the network vulnerability timely and solve the very serious problems of
network security, this paper puts forward the attack graph which is based on intrusion …

A risk assessment method of network host node with host importance

Y Hongyu, Y Haihang, Z Liang - Journal of Beijing University of …, 2022 - journal.bupt.edu.cn
The existing network host node assessment methods based on attack graph have
unreasonable calculation of atomic attack probability and asset protection value, and ignore …

[PDF][PDF] Finding optimal attack path using attack graphs: a survey

S Khaitan, S Raheja - International Journal of Soft Computing and …, 2011 - Citeseer
As the traditional methods, the result of vulnerability scanning can't directly reflect complex
attack routes existing in network, so the concept of attack graph comes. After analyzing host …

[引用][C] Network security analysis model based on the increase in attack ability.

H Zhang, P Su, D Feng - Jisuanji Yanjiu yu Fazhan(Computer Research and …, 2007

[引用][C] Method of network attack graph generation based on greedy Policy

SH Song, YL Lu, Y Xia, H Yuan - Jisuanji …, 2011 - … Society,| a 418# Guilin Road| c …