• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2011, Vol. 33 ›› Issue (8): 45-52.

• 论文 • Previous Articles     Next Articles

Vulnerability Tree Modeling for  Host Security Attributes by Efficiency Priority

LU Zhiyong1,JIANG Liang2,TANG Chaojing2   

  1. (1.Corps 63880,Luoyang 471003;
    2.School of Electronics Science and Engineering,
    National University of Defense Technology,Changsha 410073,China)
  • Received:2009-12-28 Revised:2010-04-05 Online:2011-08-25 Published:2011-08-25

Abstract:

The attack graph, attack tree and attack net are important modeling methods for testing and evaluating network security, but these methods are disordered and short of pertinence when choosing attacks. To overcome these shortages, this paper models the vulnerability tree of the security attributes for each host, taking the network vulnerability as the leaf node and attacks as tree borders. After analyzing the fruit efficiency and time efficiency comprehensively, we present an approach for vulnerability tree modeling of the host security attributes by efficiency priority. Finally, the feasibility and validity of the approach are verified using some practical examples.

Key words: host security attribute;vulnerability tree;efficiency;evaluation;modeling