TY - GEN
T1 - Overview on attack graph generation and visualization technology
AU - Yi, Shengwei
AU - Peng, Yong
AU - Xiong, Qi
AU - Wang, Ting
AU - Dai, Zhonghua
AU - Gao, Haihui
AU - Xu, Junfeng
AU - Wang, Jiteng
AU - Xu, Lijuan
PY - 2013
Y1 - 2013
N2 - Network vulnerability can be analyzed automatically by attack graph. Attack graph tools can generate attack paths in network and show users the network vulnerabilities analyzing process for network security risk analysis. There are some problems such as state space explosion, the high complexity of algorithms, being difficult to demonstrate graphically, and so on, for attack graph generation and visualization techniques. Therefore, we surveyed and analyzed the attack graph generation and visualization technology. We summarized the open source tools like MulVAL, TVA. Attack Graph Toolkit, NetSPA and so on, and the commercial tools, for example, Cauldron, FireMon, Skybox View. We compared and analyzed these tools from the aspects of the attack graph types, scalability, or complexity of attack graph generation algorithm, the degree of attack graph visualization. Their common denominator was summarized, and their different points were analyzed. The future and applications for attack graph were forecasted, for example its applications in industrial control systems, and in the network security defense and risk assessment.
AB - Network vulnerability can be analyzed automatically by attack graph. Attack graph tools can generate attack paths in network and show users the network vulnerabilities analyzing process for network security risk analysis. There are some problems such as state space explosion, the high complexity of algorithms, being difficult to demonstrate graphically, and so on, for attack graph generation and visualization techniques. Therefore, we surveyed and analyzed the attack graph generation and visualization technology. We summarized the open source tools like MulVAL, TVA. Attack Graph Toolkit, NetSPA and so on, and the commercial tools, for example, Cauldron, FireMon, Skybox View. We compared and analyzed these tools from the aspects of the attack graph types, scalability, or complexity of attack graph generation algorithm, the degree of attack graph visualization. Their common denominator was summarized, and their different points were analyzed. The future and applications for attack graph were forecasted, for example its applications in industrial control systems, and in the network security defense and risk assessment.
KW - Attack Graph
KW - Attack Paths
KW - Network Vulnerability Analysis
KW - Visualization
UR - http://www.scopus.com/inward/record.url?scp=84903287599&partnerID=8YFLogxK
U2 - 10.1109/ICASID.2013.6825274
DO - 10.1109/ICASID.2013.6825274
M3 - Conference contribution
AN - SCOPUS:84903287599
SN - 9781479911110
T3 - Proceedings of the International Conference on Anti-Counterfeiting, Security and Identification, ASID
BT - 2013 IEEE International Conference on Anti-Counterfeiting, Security and Identification, ASID 2013
PB - IEEE Computer Society
T2 - 2013 IEEE International Conference on Anti-Counterfeiting, Security and Identification, ASID 2013
Y2 - 25 October 2013 through 27 October 2013
ER -