Title :
Access Graph to Analyze Network Vulnerabilities
Author :
Xiao, Xiaochun ; Zhang, Tiange ; Zhang, Gendu
Author_Institution :
Sch. of Compute Sci., Fudan Univ., Shanghai
Abstract :
Protecting computer network security is critical today. Many graph-based approaches have been proposed to analyze network vulnerabilities. Attack Graph is the most influential one. But attack graphs grow exponentially with the size of the network. In this paper, we propose a comprehensive framework for network vulnerabilities modeling and analysis based on the access graph. As a complement to the attack graph approach, the access graph is host-centric approach, which grows polynomially with the number of hosts and so has the benefit of being computationally feasible on large networks. Compared with related works, our approach improves in both performance and computational cost.
Keywords :
computer networks; network theory (graphs); telecommunication security; access graph; attack graph; computer network security; host-centric approach; network vulnerability; Application software; Computational efficiency; Computational intelligence; Computer industry; Computer networks; Computer security; Conferences; Polynomials; Power system modeling; Protection;
Conference_Titel :
Computational Intelligence and Industrial Application, 2008. PACIIA '08. Pacific-Asia Workshop on
Conference_Location :
Wuhan
Print_ISBN :
978-0-7695-3490-9
DOI :
10.1109/PACIIA.2008.183