Generation and risk analysis of network attack graph

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Attack graph describes how an attacker can compromise with network security. To generate the attack graph, we required system as well as vulnerability information. The system information contains scanned data of a network, which is to be analyzed. The vulnerability data contain information about, how exploits can be generated due to multiple vulnerabilities and what effects can be of such exploitation. Multihost multistage vulnerability analysis (MulVAL) tool is used for generating attack graph in this work. MulVAL generated graphs are logical attack graphs based on logical programming and based on dependencies among attack goal and configuration information. The risk of network attack graph is measured through graph topology theoretic properties (connectivity, cycles, and depth), and analysis of possible attacks paths is carried out in this paper.

Cite

CITATION STYLE

APA

Prasad, K., Kumar, S., Negi, A., & Mahanti, A. (2016). Generation and risk analysis of network attack graph. In Advances in Intelligent Systems and Computing (Vol. 404, pp. 507–516). Springer Verlag. https://doi.org/10.1007/978-81-322-2695-6_42

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free