CORC  > 北京大学  > 信息科学技术学院
An Adjacency Matrixes-based Model for Network Security Analysis
Xie, Anming ; Tang, Cong ; Gui, Nike ; Cai, Zhuhua ; Hu, Jianbin ; Chen, Zhong
2010
关键词network security attack graphs adjacency matrixes ATTACK GRAPHS GENERATION
英文摘要To protect our networks against malicious intrusions, we need to evaluate these networks security. Previous works on attack graphs have provided meaningful conclusions on security measurement. However, large attack graphs are still hard to be understood vividly, and few suggestions have been proposed to prevent inside malicious attackers from attacking networks. To address these problems, we propose a novel approach to evaluate network security based on adjacency matrixes, which are constructed from existing attack graphs. With our model, we use gray scale images to show overall security vividly, and get quantitative evaluation scores. Moreover, we create a prioritized list of potential threatening hosts, which can help network administrators to harden network step by step. Analysis on computation cost shows that the upper bound computation cost of our measurement methodology is O(N(3)), which could be completed in real time. We also give an example to show how to put our methods in practice.; http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000287029400175&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=8e1609b174ce4e31116a60747a720701 ; Engineering, Electrical & Electronic; Telecommunications; EI; CPCI-S(ISTP); 0
语种英语
DOI标识10.1109/ICC.2010.5502655
内容类型其他
源URL[http://ir.pku.edu.cn/handle/20.500.11897/406186]  
专题信息科学技术学院
推荐引用方式
GB/T 7714
Xie, Anming,Tang, Cong,Gui, Nike,et al. An Adjacency Matrixes-based Model for Network Security Analysis. 2010-01-01.
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace