DocumentCode :
2439583
Title :
Access Graph to Analyze Network Vulnerabilities
Author :
Xiao, Xiaochun ; Zhang, Tiange ; Zhang, Gendu
Author_Institution :
Sch. of Compute Sci., Fudan Univ., Shanghai
Volume :
2
fYear :
2008
fDate :
19-20 Dec. 2008
Firstpage :
781
Lastpage :
786
Abstract :
Protecting computer network security is critical today. Many graph-based approaches have been proposed to analyze network vulnerabilities. Attack Graph is the most influential one. But attack graphs grow exponentially with the size of the network. In this paper, we propose a comprehensive framework for network vulnerabilities modeling and analysis based on the access graph. As a complement to the attack graph approach, the access graph is host-centric approach, which grows polynomially with the number of hosts and so has the benefit of being computationally feasible on large networks. Compared with related works, our approach improves in both performance and computational cost.
Keywords :
computer networks; network theory (graphs); telecommunication security; access graph; attack graph; computer network security; host-centric approach; network vulnerability; Application software; Computational efficiency; Computational intelligence; Computer industry; Computer networks; Computer security; Conferences; Polynomials; Power system modeling; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Industrial Application, 2008. PACIIA '08. Pacific-Asia Workshop on
Conference_Location :
Wuhan
Print_ISBN :
978-0-7695-3490-9
Type :
conf
DOI :
10.1109/PACIIA.2008.183
Filename :
4756883
Link To Document :
بازگشت