J4 ›› 2011, Vol. 33 ›› Issue (8): 45-52.
• 论文 • Previous Articles Next Articles
LU Zhiyong1,JIANG Liang2,TANG Chaojing2
Received:
Revised:
Online:
Published:
Abstract:
The attack graph, attack tree and attack net are important modeling methods for testing and evaluating network security, but these methods are disordered and short of pertinence when choosing attacks. To overcome these shortages, this paper models the vulnerability tree of the security attributes for each host, taking the network vulnerability as the leaf node and attacks as tree borders. After analyzing the fruit efficiency and time efficiency comprehensively, we present an approach for vulnerability tree modeling of the host security attributes by efficiency priority. Finally, the feasibility and validity of the approach are verified using some practical examples.
Key words: host security attribute;vulnerability tree;efficiency;evaluation;modeling
LU Zhiyong1,JIANG Liang2,TANG Chaojing2. Vulnerability Tree Modeling for Host Security Attributes by Efficiency Priority[J]. J4, 2011, 33(8): 45-52.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/
http://joces.nudt.edu.cn/EN/Y2011/V33/I8/45