A network security analysis method using vulnerability correlation

Zhi Yong Li*, Chao Hai Xie, Ran Tao, Hao Zhang, Na Shi

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

2 引用 (Scopus)
Plum Print visual indicator of research metrics
  • Citations
    • Citation Indexes: 2
  • Captures
    • Readers: 10
see details

摘要

Recently in-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to compute attack graphs using a variety of graphbased algorithms. However, such methods generally suffer the exponential state space problem. Therefore, this paper brings forward two conceptions of vulnerability correlation matrix and vulnerability correlation graph (VCG). An algorithm based on vulnerability correlation matrix was proposed to generate VCGs. An example was given to illustrate the application and effect of the algorithm in network security analysis. Deep analysis proves that VCGs have polynomial complexity of the number of network vulnerabilities and scale well for large networks. Moreover, the example shows that VCGs are a good help to and convenient for network security management.

源语言英语
主期刊名5th International Conference on Natural Computation, ICNC 2009
17-21
页数5
DOI
出版状态已出版 - 2009
活动5th International Conference on Natural Computation, ICNC 2009 - Tianjian, 中国
期限: 14 8月 200916 8月 2009

出版系列

姓名5th International Conference on Natural Computation, ICNC 2009
1

会议

会议5th International Conference on Natural Computation, ICNC 2009
国家/地区中国
Tianjian
时期14/08/0916/08/09

指纹

探究 'A network security analysis method using vulnerability correlation' 的科研主题。它们共同构成独一无二的指纹。

引用此

Li, Z. Y., Xie, C. H., Tao, R., Zhang, H., & Shi, N. (2009). A network security analysis method using vulnerability correlation. 在 5th International Conference on Natural Computation, ICNC 2009 (页码 17-21). 文章 5363697 (5th International Conference on Natural Computation, ICNC 2009; 卷 1). https://doi.org/10.1109/ICNC.2009.368