Approach to making strategies for network security enhancement based on attack graphs
In order to improve the overall security of networks,a method of making strategies for the network security enhancement based on global attack graphs was proposed.The method calculated the probability of the network states transition by using global attack graphs.On this basis,the security loss of n...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74653063/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537562386104320 |
---|---|
author | SI Jia-quan1 ZHANG Bing2 MAN Da-peng1 YANG Wu1 |
author_facet | SI Jia-quan1 ZHANG Bing2 MAN Da-peng1 YANG Wu1 |
author_sort | SI Jia-quan1 |
collection | DOAJ |
description | In order to improve the overall security of networks,a method of making strategies for the network security enhancement based on global attack graphs was proposed.The method calculated the probability of the network states transition by using global attack graphs.On this basis,the security loss of network states and the criticality of security elements were gotten.Finally,security elements were deleted based on maximum criticality first.The analysis of the ex-ample indicates that the enhancement strategies made by the method can improve the overall security of networks,and the operability is better than traditional methods. |
format | Article |
id | doaj-art-a839cee1899c430d9f6245ac4cd47da0 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2009-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-a839cee1899c430d9f6245ac4cd47da02025-01-14T08:30:32ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-013012312874653063Approach to making strategies for network security enhancement based on attack graphsSI Jia-quan1ZHANG Bing2MAN Da-peng1YANG Wu1In order to improve the overall security of networks,a method of making strategies for the network security enhancement based on global attack graphs was proposed.The method calculated the probability of the network states transition by using global attack graphs.On this basis,the security loss of network states and the criticality of security elements were gotten.Finally,security elements were deleted based on maximum criticality first.The analysis of the ex-ample indicates that the enhancement strategies made by the method can improve the overall security of networks,and the operability is better than traditional methods.http://www.joconline.com.cn/zh/article/74653063/network securitysecurity assessmentsecurity enhancementattack graph |
spellingShingle | SI Jia-quan1 ZHANG Bing2 MAN Da-peng1 YANG Wu1 Approach to making strategies for network security enhancement based on attack graphs Tongxin xuebao network security security assessment security enhancement attack graph |
title | Approach to making strategies for network security enhancement based on attack graphs |
title_full | Approach to making strategies for network security enhancement based on attack graphs |
title_fullStr | Approach to making strategies for network security enhancement based on attack graphs |
title_full_unstemmed | Approach to making strategies for network security enhancement based on attack graphs |
title_short | Approach to making strategies for network security enhancement based on attack graphs |
title_sort | approach to making strategies for network security enhancement based on attack graphs |
topic | network security security assessment security enhancement attack graph |
url | http://www.joconline.com.cn/zh/article/74653063/ |
work_keys_str_mv | AT sijiaquan1 approachtomakingstrategiesfornetworksecurityenhancementbasedonattackgraphs AT zhangbing2 approachtomakingstrategiesfornetworksecurityenhancementbasedonattackgraphs AT mandapeng1 approachtomakingstrategiesfornetworksecurityenhancementbasedonattackgraphs AT yangwu1 approachtomakingstrategiesfornetworksecurityenhancementbasedonattackgraphs |