Title :
A method for analyzing EPC entity security threats by using attack graphs
Author :
Zhinan Chen ; Jianhua Peng ; Caixia Liu
Author_Institution :
Dept. of Wireless Commun., Nat. Digital Switching Center, Zhengzhou, China
Abstract :
There are still not qualitative analyzing methods to analyze EPC network entity threats. So the Attack Graph theory is brought in this paper. The current Attack Graph techniques have been adjusted due to the difference of EPC network and EPC network attack, so that they can be used to analyze the threats of EPC network entities. A Finite State Machine (FSM) represented the EPC net work is built and a method for automatically generating EPC network Attack Graph is proposed which are all validated through following experiments. The result shows that, the Attack Graph analyzing method can well serve EPC- entity-threat qualitative analysis.
Keywords :
computer network security; finite state machines; graph theory; EPC entity threat qualitative analysis; EPC network attack graph; EPC network entity security threats; FSM; attack graph analyzing method; attack graph theory; attack graphs; finite state machine; qualitative analyzing methods; Human computer interaction; IP networks; Attack Graph; EPC network; Finite State Machine; qualitative analysis; security threat;
Conference_Titel :
Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4673-4997-0
DOI :
10.1109/ICSESS.2013.6615470