A Quantitative Method for Evaluating Network Security Based on Attack Graph

Author(s):  
Yukun Zheng ◽  
Kun Lv ◽  
Changzhen Hu
2010 ◽  
Vol 33 (10) ◽  
pp. 1987-1996 ◽  
Author(s):  
Yun YE ◽  
Xi-Shan XU ◽  
Yan JIA ◽  
Zhi-Chang QI

2014 ◽  
Vol 1079-1080 ◽  
pp. 816-819 ◽  
Author(s):  
Yuan Qin

With the development of computer network and rapid popularity of Internet, network information security has become the focus of safeguarding national security and social stability. In the network security event, the hacker often can’t successfully intrude into the network by means of a single host / services hacker. With the help of various kinds of "vulnerability" generated bydifferent relationship existing in multiple point multiple host, the hacker can achieve the purpose of network intrusion. Therefore one important aspect of network security is after obtaining the vulnerability of the network information, considering a combination of multiple exploits and analyzing the attack path of network penetration attacks that the attacker may take.


Sign in / Sign up

Export Citation Format

Share Document