Survey on application of attack graph technology
Attack graph technology was a measure to predict the pattern and process used by attacker to compromise the target network,so as to guide defender to take defensive measures and improve network security.The basic component,types of attack graphs and respective advantages and disadvantages of each ty...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2017-11-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017213/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539508739244032 |
---|---|
author | Zi-wei YE Yuan-bo GUO Chen-dong WANG An-kang JU |
author_facet | Zi-wei YE Yuan-bo GUO Chen-dong WANG An-kang JU |
author_sort | Zi-wei YE |
collection | DOAJ |
description | Attack graph technology was a measure to predict the pattern and process used by attacker to compromise the target network,so as to guide defender to take defensive measures and improve network security.The basic component,types of attack graphs and respective advantages and disadvantages of each type were reviewed.The application status of attack graph technology in risk assessment and network hardening,intrusion detection and alarm correlation,and other aspects were introduced.Several kinds of existing attack graph generation and analysis tools were also presented.At last a survey of some challenges and research trends in future research work was provided. |
format | Article |
id | doaj-art-6792b65448b6431a84d3f1c8358f0dec |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2017-11-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-6792b65448b6431a84d3f1c8358f0dec2025-01-14T07:13:22ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-11-013812113259713422Survey on application of attack graph technologyZi-wei YEYuan-bo GUOChen-dong WANGAn-kang JUAttack graph technology was a measure to predict the pattern and process used by attacker to compromise the target network,so as to guide defender to take defensive measures and improve network security.The basic component,types of attack graphs and respective advantages and disadvantages of each type were reviewed.The application status of attack graph technology in risk assessment and network hardening,intrusion detection and alarm correlation,and other aspects were introduced.Several kinds of existing attack graph generation and analysis tools were also presented.At last a survey of some challenges and research trends in future research work was provided.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017213/attack graphvulnerabilitynetwork hardeningalert correlation |
spellingShingle | Zi-wei YE Yuan-bo GUO Chen-dong WANG An-kang JU Survey on application of attack graph technology Tongxin xuebao attack graph vulnerability network hardening alert correlation |
title | Survey on application of attack graph technology |
title_full | Survey on application of attack graph technology |
title_fullStr | Survey on application of attack graph technology |
title_full_unstemmed | Survey on application of attack graph technology |
title_short | Survey on application of attack graph technology |
title_sort | survey on application of attack graph technology |
topic | attack graph vulnerability network hardening alert correlation |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017213/ |
work_keys_str_mv | AT ziweiye surveyonapplicationofattackgraphtechnology AT yuanboguo surveyonapplicationofattackgraphtechnology AT chendongwang surveyonapplicationofattackgraphtechnology AT ankangju surveyonapplicationofattackgraphtechnology |