• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2010, Vol. 32 ›› Issue (6): 22-25.doi: 10.3969/j.issn.1007130X.2010.

• 论文 • Previous Articles     Next Articles

A Method of Generating the MultiTargets Attack Graphs Based on Greedy Policies

ZHU Ming1,YIN Jianping1,CHENG Jieren1,2,LIU Qiang1,LIN Jiarun1   

  1. (1.School of Computer Science,National University of Defense Technology,Changsha 410073;
    2.Xiangnan University,Chenzhou 423000,China)
  • Received:2009-11-15 Revised:2010-02-09 Online:2010-06-01 Published:2010-06-01

Abstract:

In order to avoid the combination of states occurred in the generation of attack graphs while analyzing network vulnerabilities and to make the attack graphs available for analyzing the multitargets’ vulnerabilities, a new method of generating attack graphs based on greedy policies is proposed. The method introduces the  network node correlations, uses greedy policies to reduce the amount of vulnerabilities, chooses the attack routes that allow attackers to gain network node priority with the greatest potential and generate the attack graphs with those attack routes. The algorithm analysis and the experimental results show that the cost of time and space of the method is the polynomial level of the network node number and the network node correlation number, which means it has solved the problem of the great combination of states effectively. The attack graph it generates covers all network nodes that attackers can access, so the method can be used to analyze the multitargets’ vulnerabilities.

Key words: network vulnerability analysis;network node correlation;multitargets attack graph;greedy policy

CLC Number: