Research on the risk adjacency matrix based on attack graphs

Aimed at the problem that the difficulty to understand the very complicated attack graphs generated by a variety of existing tools,a method of RAM(risk adjacency matrix) based on attack graphs was proposed,and feasibility and efficient of proposed method was verified in experiment.The experimental r...

Full description

Saved in:
Bibliographic Details
Main Authors: YE Yun, XU Xi-shan, JIA Yan, QI Zhi-chang, CHENG Wen-cong
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74419519/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537812735721472
author YE Yun
XU Xi-shan
JIA Yan
QI Zhi-chang
CHENG Wen-cong
author_facet YE Yun
XU Xi-shan
JIA Yan
QI Zhi-chang
CHENG Wen-cong
author_sort YE Yun
collection DOAJ
description Aimed at the problem that the difficulty to understand the very complicated attack graphs generated by a variety of existing tools,a method of RAM(risk adjacency matrix) based on attack graphs was proposed,and feasibility and efficient of proposed method was verified in experiment.The experimental results on the network showed that visualization of attack graphs was extended significantly,and the re-computing problem caused by the rings and loops in the risk assessment was solved in a simple and efficient way.
format Article
id doaj-art-a4e2c05021e746c8bb657ce94254b348
institution Kabale University
issn 1000-436X
language zho
publishDate 2011-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-a4e2c05021e746c8bb657ce94254b3482025-01-14T08:23:46ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-013211212074419519Research on the risk adjacency matrix based on attack graphsYE YunXU Xi-shanJIA YanQI Zhi-changCHENG Wen-congAimed at the problem that the difficulty to understand the very complicated attack graphs generated by a variety of existing tools,a method of RAM(risk adjacency matrix) based on attack graphs was proposed,and feasibility and efficient of proposed method was verified in experiment.The experimental results on the network showed that visualization of attack graphs was extended significantly,and the re-computing problem caused by the rings and loops in the risk assessment was solved in a simple and efficient way.http://www.joconline.com.cn/zh/article/74419519/vulnerabilityattack graphsclustering algorithmrisk adjacency matrix
spellingShingle YE Yun
XU Xi-shan
JIA Yan
QI Zhi-chang
CHENG Wen-cong
Research on the risk adjacency matrix based on attack graphs
Tongxin xuebao
vulnerability
attack graphs
clustering algorithm
risk adjacency matrix
title Research on the risk adjacency matrix based on attack graphs
title_full Research on the risk adjacency matrix based on attack graphs
title_fullStr Research on the risk adjacency matrix based on attack graphs
title_full_unstemmed Research on the risk adjacency matrix based on attack graphs
title_short Research on the risk adjacency matrix based on attack graphs
title_sort research on the risk adjacency matrix based on attack graphs
topic vulnerability
attack graphs
clustering algorithm
risk adjacency matrix
url http://www.joconline.com.cn/zh/article/74419519/
work_keys_str_mv AT yeyun researchontheriskadjacencymatrixbasedonattackgraphs
AT xuxishan researchontheriskadjacencymatrixbasedonattackgraphs
AT jiayan researchontheriskadjacencymatrixbasedonattackgraphs
AT qizhichang researchontheriskadjacencymatrixbasedonattackgraphs
AT chengwencong researchontheriskadjacencymatrixbasedonattackgraphs