Object

Title: On attack graph model of network security

Co-author(s) :

Alipour Daryoush

Abstract:

All types of network systems are subject to computer attacks. The overall security of a network cannot be determined by simply considering the vulnerable points in the network; it is essential to realize how vulnerabilities can be combined in the same host or in a set of connected hosts to initiate an attack. Attack graph is a tool for modeling compositions of vulnerabilities and thus representing possible multi-stage multi-host attacks in networks. Attack graphs can be used for measuring network security; supporting security solutions by identifying vulnerabilities that should be removed such that no attack can be realized targeting given critical resources, and thus hardening the network. We consider a general model of attack graphs and a scheme of attack graph generating algorithm; and investigate graph-theoretical problems related to particular tasks of network hardening.

Publisher:

ITHEA

Date of publication:

2015

Identifier:

oai:noad.sci.am:135934

ISSN:

2367-5128

Language:

English

Journal or Publication Title:

Information Content and Processing

Volume:

2

Number:

1

URL:


Additional Information:

hasmik@ipia.sci.am ; computernano@gmail.com

Affiliation:

Institute for Informatics and Automation Problems

Country:

Armenia

Object collections:

Last modified:

Mar 2, 2021

In our library since:

Jul 27, 2020

Number of object content hits:

25

All available object's versions:

https://noad.sci.am/publication/149527

Show description in RDF format:

RDF

Show description in OAI-PMH format:

OAI-PMH

This page uses 'cookies'. More information