首页    期刊浏览 2024年11月07日 星期四
登录注册

文章基本信息

  • 标题:Some Algorithms for Generating Attack Graph
  • 本地全文:下载
  • 作者:Tito Waluyo Purboyo ; Kuspriyanto
  • 期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
  • 印刷版ISSN:2277-6451
  • 电子版ISSN:2277-128X
  • 出版年度:2012
  • 卷号:2
  • 期号:8
  • 出版社:S.S. Mishra
  • 摘要:Attack graph can provide clues for the network defender on how an attacker ex ploits the vulnerability on the network to achieve goals. System administrators use attack graph to determine how vulnerable their systems and to determine what security measures are used to maintain their systems. In a network of large and complex organizations, securing a network is a very challenging task. Attack graphs are very important in the effort to secure the network, because it can directly indicate the presence of vulnerabilities in network and how attackers use the vulnerabilities to implement an effective attack. In this paper, we will describe some very good algorithms can be used to generate the attack graph.
  • 关键词:Generating Attack Graph; Network Security; Vulnerability Analysis; Attack Graph Generation ;Algorithm.
国家哲学社会科学文献中心版权所有