TY - GEN
T1 - A network security analysis method using vulnerability correlation
AU - Li, Zhi Yong
AU - Xie, Chao Hai
AU - Tao, Ran
AU - Zhang, Hao
AU - Shi, Na
PY - 2009
Y1 - 2009
N2 - Recently in-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to compute attack graphs using a variety of graphbased algorithms. However, such methods generally suffer the exponential state space problem. Therefore, this paper brings forward two conceptions of vulnerability correlation matrix and vulnerability correlation graph (VCG). An algorithm based on vulnerability correlation matrix was proposed to generate VCGs. An example was given to illustrate the application and effect of the algorithm in network security analysis. Deep analysis proves that VCGs have polynomial complexity of the number of network vulnerabilities and scale well for large networks. Moreover, the example shows that VCGs are a good help to and convenient for network security management.
AB - Recently in-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to compute attack graphs using a variety of graphbased algorithms. However, such methods generally suffer the exponential state space problem. Therefore, this paper brings forward two conceptions of vulnerability correlation matrix and vulnerability correlation graph (VCG). An algorithm based on vulnerability correlation matrix was proposed to generate VCGs. An example was given to illustrate the application and effect of the algorithm in network security analysis. Deep analysis proves that VCGs have polynomial complexity of the number of network vulnerabilities and scale well for large networks. Moreover, the example shows that VCGs are a good help to and convenient for network security management.
KW - Attack graph
KW - Network security
KW - Vulnerability correlation
KW - Vulnerability correlation graph
UR - http://www.scopus.com/inward/record.url?scp=77950552252&partnerID=8YFLogxK
U2 - 10.1109/ICNC.2009.368
DO - 10.1109/ICNC.2009.368
M3 - Conference contribution
AN - SCOPUS:77950552252
SN - 9780769537368
T3 - 5th International Conference on Natural Computation, ICNC 2009
SP - 17
EP - 21
BT - 5th International Conference on Natural Computation, ICNC 2009
T2 - 5th International Conference on Natural Computation, ICNC 2009
Y2 - 14 August 2009 through 16 August 2009
ER -