J4 ›› 2010, Vol. 32 ›› Issue (6): 22-25.doi: 10.3969/j.issn.1007130X.2010.
• 论文 • Previous Articles Next Articles
ZHU Ming1,YIN Jianping1,CHENG Jieren1,2,LIU Qiang1,LIN Jiarun1
Received:
Revised:
Online:
Published:
Abstract:
In order to avoid the combination of states occurred in the generation of attack graphs while analyzing network vulnerabilities and to make the attack graphs available for analyzing the multitargets’ vulnerabilities, a new method of generating attack graphs based on greedy policies is proposed. The method introduces the network node correlations, uses greedy policies to reduce the amount of vulnerabilities, chooses the attack routes that allow attackers to gain network node priority with the greatest potential and generate the attack graphs with those attack routes. The algorithm analysis and the experimental results show that the cost of time and space of the method is the polynomial level of the network node number and the network node correlation number, which means it has solved the problem of the great combination of states effectively. The attack graph it generates covers all network nodes that attackers can access, so the method can be used to analyze the multitargets’ vulnerabilities.
Key words: network vulnerability analysis;network node correlation;multitargets attack graph;greedy policy
CLC Number:
TP393.08
ZHU Ming1,YIN Jianping1,CHENG Jieren1,2,LIU Qiang1,LIN Jiarun1. A Method of Generating the MultiTargets Attack Graphs Based on Greedy Policies[J]. J4, 2010, 32(6): 22-25.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/10.3969/j.issn.1007130X.2010.
http://joces.nudt.edu.cn/EN/Y2010/V32/I6/22