A network security analysis method using vulnerability correlation

Zhi Yong Li*, Chao Hai Xie, Ran Tao, Hao Zhang, Na Shi

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Recently in-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to compute attack graphs using a variety of graphbased algorithms. However, such methods generally suffer the exponential state space problem. Therefore, this paper brings forward two conceptions of vulnerability correlation matrix and vulnerability correlation graph (VCG). An algorithm based on vulnerability correlation matrix was proposed to generate VCGs. An example was given to illustrate the application and effect of the algorithm in network security analysis. Deep analysis proves that VCGs have polynomial complexity of the number of network vulnerabilities and scale well for large networks. Moreover, the example shows that VCGs are a good help to and convenient for network security management.

Original languageEnglish
Title of host publication5th International Conference on Natural Computation, ICNC 2009
Pages17-21
Number of pages5
DOIs
Publication statusPublished - 2009
Event5th International Conference on Natural Computation, ICNC 2009 - Tianjian, China
Duration: 14 Aug 200916 Aug 2009

Publication series

Name5th International Conference on Natural Computation, ICNC 2009
Volume1

Conference

Conference5th International Conference on Natural Computation, ICNC 2009
Country/TerritoryChina
CityTianjian
Period14/08/0916/08/09

Keywords

  • Attack graph
  • Network security
  • Vulnerability correlation
  • Vulnerability correlation graph

Fingerprint

Dive into the research topics of 'A network security analysis method using vulnerability correlation'. Together they form a unique fingerprint.

Cite this