Skip Nav Destination
ASME Press Select Proceedings
International Conference on Information Technology and Computer Science, 3rd (ITCS 2011)
Editor
V. E. Muhin,
V. E. Muhin
National Technical University of Ukraine
Search for other works by this author on:
ISBN:
9780791859742
No. of Pages:
656
Publisher:
ASME Press
Publication date:
2011
eBook Chapter
22 Network Security Analysis Based on Host-Based Attack Graph
By
Shangqin Zhong
,
Shangqin Zhong
Key Laboratory of Network and Information Attack & Defence Technology of MOE,
Beijing University of Posts and Telecommunications
, Beijing,
China
, 100876National Engineering Laboratory for Disaster Backup and Recovery,
Beijing University of Posts and Telecommunications
, Beijing,
; Zhongshangqin2003@yahoo.com.cnChina
, 100876
Search for other works by this author on:
Wenbin Yao
,
Wenbin Yao
Key Laboratory of Network and Information Attack & Defence Technology of MOE,
Beijing University of Posts and Telecommunications
, Beijing,
China
, 100876National Engineering Laboratory for Disaster Backup and Recovery,
Beijing University of Posts and Telecommunications
, Beijing,
China
, 100876
Search for other works by this author on:
Haihui Ge
,
Haihui Ge
Key Laboratory of Network and Information Attack & Defence Technology of MOE,
Beijing University of Posts and Telecommunications
, Beijing,
China
, 100876National Engineering Laboratory for Disaster Backup and Recovery,
Beijing University of Posts and Telecommunications
, Beijing,
China
, 100876
Search for other works by this author on:
Yixian Yang
Yixian Yang
Key Laboratory of Network and Information Attack & Defence Technology of MOE,
Beijing University of Posts and Telecommunications
, Beijing,
China
, 100876National Engineering Laboratory for Disaster Backup and Recovery,
Beijing University of Posts and Telecommunications
, Beijing,
China
, 100876
Search for other works by this author on:
Page Count:
5
-
Published:2011
Citation
Zhong, S, Yao, W, Ge, H, & Yang, Y. "Network Security Analysis Based on Host-Based Attack Graph." International Conference on Information Technology and Computer Science, 3rd (ITCS 2011). Ed. Muhin, VE, & Hu, WB. ASME Press, 2011.
Download citation file:
Network attack graph was an important tool for network security analysis. With inefficient generating algorithm, previous attack graphs for network assessment and analysis were in large-scale. As building model more reasonably, a simple, flexible and efficient method to generate host-based attack graph was proposed. Based on the generated host-based attack graph, an approach of analyzing network security by using theory of iterative matrix was described. It is proved to be intuitive, efficient and accurate, as it describes the overall security situation of network and facilitates network security administrator to identify the key hosts.
Topics:
Network security
Abstract
Keywords
1. Introduction
2. Algorithm of Host-Based Attack Graph Generation
3. Network Security Analysis Based on Host-Based Attack Graph
4. Network Security Analysis of Experimental Network
5. Conclusion
Acknowledgments
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
Fatpet: An Attack Tree-Based Framework of Penetration Tests in Distributed Environment
International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS 2011)
Network Security Measures on Electronic Commerce
International Conference on Information Technology and Management Engineering (ITME 2011)
Related Articles
Detection of Geographic Information System Security Hazards in the IoT Based on Network Security Situation Awareness
J. Test. Eval. (January,0001)