Research on attack graph generation for network security situation

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Attack graph generation method based on network security situation is presented. Attack graph technique bases attack graph on the target network and the attack model. Generally, attack path is shown that the attacker uses vulnerability of target network to carry out network attack by graph structure. Attribute attack graph generation method based on breadth-first is put forward, which during the process of the attack graph generation solve the problem of circle path and combination explosion, the different scale of simulation experiment shows that the research results can found in time and make up for security problems existing in the network system, effectively improve the survivability of the network system, so as to improve the ability that network system deals with all kinds of sudden attack. © Springer-Verlag Berlin Heidelberg 2013.

Cite

CITATION STYLE

APA

Wang, Y., Wang, H., Zhao, C., Zhang, Y., & Yu, M. (2013). Research on attack graph generation for network security situation. Advances in Intelligent Systems and Computing, 212, 1147–1154. https://doi.org/10.1007/978-3-642-37502-6_134

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free