全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
软件学报  2010 

Two Formal Analyses of Attack Graphs
攻击图的两种形式化分析

Keywords: vulnerability,attack graph,valid attack path,optimization security measures,greedy algorithm
脆弱性
,攻击图,有效攻击路径,最优弥补集,贪婪算法

Full-Text   Cite this paper   Add to My Lib

Abstract:

An attack graph is a model-based vulnerability analysis technology, which can automatically analyze the interrelation among vulnerabilities in the network and the potential threats resulting from the vulnerabilities. Since the state-based attack graphs can not be applied to the real large networks for the combinatorial explosion in the number of attack paths, the study is now shifted to attribute-based. Based on attribute-based attack graphs, this paper discusses the loop attack paths and the optimization security measures. For the former, an iterative algorithm is presented to find all the non-loop attack paths to the key attributes with their depth less than the given number n. For the latter, it is proved to be an NP-complete problem, and the greedy algorithm is proposed to solve the problem with polynomial time complexity.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133