A Suite of Metrics for Network Attack Graph Analytics

2017 ◽  
pp. 141-176 ◽  
Author(s):  
Steven Noel ◽  
Sushil Jajodia
Author(s):  
Ghanshyam S. Bopche ◽  
Gopal N. Rai ◽  
B. Ramchandra Reddy ◽  
B. M. Mehtre

2014 ◽  
Vol 513-517 ◽  
pp. 1779-1782
Author(s):  
Zheng Chan Rao ◽  
Tian Yin Pu

The computer network attack graph generation method obtained mostly through network scanning, this network reachability information, this approach takes a long presence information and incomplete defects by analyzing network reachability main task of research and developing trends is proposed based on binary decision diagrams algorithm approach to achieve network reachability studies. The algorithm uses the decision diagram modeling firewall rules, through the collection operations to achieve network reachability studies.


2014 ◽  
Vol 1079-1080 ◽  
pp. 816-819 ◽  
Author(s):  
Yuan Qin

With the development of computer network and rapid popularity of Internet, network information security has become the focus of safeguarding national security and social stability. In the network security event, the hacker often can’t successfully intrude into the network by means of a single host / services hacker. With the help of various kinds of "vulnerability" generated bydifferent relationship existing in multiple point multiple host, the hacker can achieve the purpose of network intrusion. Therefore one important aspect of network security is after obtaining the vulnerability of the network information, considering a combination of multiple exploits and analyzing the attack path of network penetration attacks that the attacker may take.


2008 ◽  
Vol 27 (5-6) ◽  
pp. 188-196 ◽  
Author(s):  
Shaojun Zhang ◽  
Jianhua Li ◽  
Xiuzhen Chen ◽  
Lei Fan
Keyword(s):  

2017 ◽  
Vol 10 (6) ◽  
pp. 23-32
Author(s):  
Yuan Feng ◽  
Lu Wang ◽  
Jianwei Zhang ◽  
Zengyu Cai ◽  
Yong Gan

Sign in / Sign up

Export Citation Format

Share Document