Attack graph based evaluation of network security

75Citations
Citations of this article
66Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs (trees, nets), the subsequent checking of various properties of these graphs, and determining security metrics which can explain possible ways to increase security level. The paper suggests a new approach to security evaluation based on comprehensive simulation of malefactor's actions, construction of attack graphs and computation of different security metrics. The approach is intended for using both at design and exploitation stages of computer networks. The implemented software system is described, and the examples of experiments for analysis of network security level are considered. © IFIP International Federation for Information Processing 2006.

Cite

CITATION STYLE

APA

Kotenko, I., & Stepashkin, M. (2006). Attack graph based evaluation of network security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4237 LNCS, pp. 216–227). Springer Verlag. https://doi.org/10.1007/11909033_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free