• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2012, Vol. 34 ›› Issue (2): 9-12.

• 论文 • Previous Articles     Next Articles

Attack Graph Optimization Based on Attack Distance

HE Zhiqiang,LOU Fang,LI Liang   

  1. (China Academy of Engineering Physics,Mianyang 621900,China)
  • Received:2010-07-30 Revised:2010-10-25 Online:2012-02-25 Published:2012-02-25

Abstract:

Traditional attack graph generation methods have the problem of state explosion with the network scale expansion. Network security administrators are often overwhelmed by holding redundant attack graphs. The complex attack graph is optimized by using attack distance, which can eliminate unnecessary attack paths and choose the optimal attack paths. The administrators can refer to the optimized attack graph and get the defense information. The experimental results show that it retains the most likely attack path and simplifies the attack graph. With the expansion of network scale, the effect has become increasingly evident.

Key words: network attack;network security;attack distance;attack graph