An Adjacency Matrixes-based Model for Network Security Analysis | |
Xie, Anming ; Tang, Cong ; Gui, Nike ; Cai, Zhuhua ; Hu, Jianbin ; Chen, Zhong | |
2010 | |
关键词 | network security attack graphs adjacency matrixes ATTACK GRAPHS GENERATION |
英文摘要 | To protect our networks against malicious intrusions, we need to evaluate these networks security. Previous works on attack graphs have provided meaningful conclusions on security measurement. However, large attack graphs are still hard to be understood vividly, and few suggestions have been proposed to prevent inside malicious attackers from attacking networks. To address these problems, we propose a novel approach to evaluate network security based on adjacency matrixes, which are constructed from existing attack graphs. With our model, we use gray scale images to show overall security vividly, and get quantitative evaluation scores. Moreover, we create a prioritized list of potential threatening hosts, which can help network administrators to harden network step by step. Analysis on computation cost shows that the upper bound computation cost of our measurement methodology is O(N(3)), which could be completed in real time. We also give an example to show how to put our methods in practice.; http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000287029400175&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=8e1609b174ce4e31116a60747a720701 ; Engineering, Electrical & Electronic; Telecommunications; EI; CPCI-S(ISTP); 0 |
语种 | 英语 |
DOI标识 | 10.1109/ICC.2010.5502655 |
内容类型 | 其他 |
源URL | [http://ir.pku.edu.cn/handle/20.500.11897/406186] |
专题 | 信息科学技术学院 |
推荐引用方式 GB/T 7714 | Xie, Anming,Tang, Cong,Gui, Nike,et al. An Adjacency Matrixes-based Model for Network Security Analysis. 2010-01-01. |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论