Survey on application of attack graph technology

Attack graph technology was a measure to predict the pattern and process used by attacker to compromise the target network,so as to guide defender to take defensive measures and improve network security.The basic component,types of attack graphs and respective advantages and disadvantages of each ty...

Full description

Saved in:
Bibliographic Details
Main Authors: Zi-wei YE, Yuan-bo GUO, Chen-dong WANG, An-kang JU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2017-11-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017213/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539508739244032
author Zi-wei YE
Yuan-bo GUO
Chen-dong WANG
An-kang JU
author_facet Zi-wei YE
Yuan-bo GUO
Chen-dong WANG
An-kang JU
author_sort Zi-wei YE
collection DOAJ
description Attack graph technology was a measure to predict the pattern and process used by attacker to compromise the target network,so as to guide defender to take defensive measures and improve network security.The basic component,types of attack graphs and respective advantages and disadvantages of each type were reviewed.The application status of attack graph technology in risk assessment and network hardening,intrusion detection and alarm correlation,and other aspects were introduced.Several kinds of existing attack graph generation and analysis tools were also presented.At last a survey of some challenges and research trends in future research work was provided.
format Article
id doaj-art-6792b65448b6431a84d3f1c8358f0dec
institution Kabale University
issn 1000-436X
language zho
publishDate 2017-11-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-6792b65448b6431a84d3f1c8358f0dec2025-01-14T07:13:22ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-11-013812113259713422Survey on application of attack graph technologyZi-wei YEYuan-bo GUOChen-dong WANGAn-kang JUAttack graph technology was a measure to predict the pattern and process used by attacker to compromise the target network,so as to guide defender to take defensive measures and improve network security.The basic component,types of attack graphs and respective advantages and disadvantages of each type were reviewed.The application status of attack graph technology in risk assessment and network hardening,intrusion detection and alarm correlation,and other aspects were introduced.Several kinds of existing attack graph generation and analysis tools were also presented.At last a survey of some challenges and research trends in future research work was provided.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017213/attack graphvulnerabilitynetwork hardeningalert correlation
spellingShingle Zi-wei YE
Yuan-bo GUO
Chen-dong WANG
An-kang JU
Survey on application of attack graph technology
Tongxin xuebao
attack graph
vulnerability
network hardening
alert correlation
title Survey on application of attack graph technology
title_full Survey on application of attack graph technology
title_fullStr Survey on application of attack graph technology
title_full_unstemmed Survey on application of attack graph technology
title_short Survey on application of attack graph technology
title_sort survey on application of attack graph technology
topic attack graph
vulnerability
network hardening
alert correlation
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017213/
work_keys_str_mv AT ziweiye surveyonapplicationofattackgraphtechnology
AT yuanboguo surveyonapplicationofattackgraphtechnology
AT chendongwang surveyonapplicationofattackgraphtechnology
AT ankangju surveyonapplicationofattackgraphtechnology