Research on the risk adjacency matrix based on attack graphs
Aimed at the problem that the difficulty to understand the very complicated attack graphs generated by a variety of existing tools,a method of RAM(risk adjacency matrix) based on attack graphs was proposed,and feasibility and efficient of proposed method was verified in experiment.The experimental r...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2011-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74419519/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537812735721472 |
---|---|
author | YE Yun XU Xi-shan JIA Yan QI Zhi-chang CHENG Wen-cong |
author_facet | YE Yun XU Xi-shan JIA Yan QI Zhi-chang CHENG Wen-cong |
author_sort | YE Yun |
collection | DOAJ |
description | Aimed at the problem that the difficulty to understand the very complicated attack graphs generated by a variety of existing tools,a method of RAM(risk adjacency matrix) based on attack graphs was proposed,and feasibility and efficient of proposed method was verified in experiment.The experimental results on the network showed that visualization of attack graphs was extended significantly,and the re-computing problem caused by the rings and loops in the risk assessment was solved in a simple and efficient way. |
format | Article |
id | doaj-art-a4e2c05021e746c8bb657ce94254b348 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2011-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-a4e2c05021e746c8bb657ce94254b3482025-01-14T08:23:46ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-013211212074419519Research on the risk adjacency matrix based on attack graphsYE YunXU Xi-shanJIA YanQI Zhi-changCHENG Wen-congAimed at the problem that the difficulty to understand the very complicated attack graphs generated by a variety of existing tools,a method of RAM(risk adjacency matrix) based on attack graphs was proposed,and feasibility and efficient of proposed method was verified in experiment.The experimental results on the network showed that visualization of attack graphs was extended significantly,and the re-computing problem caused by the rings and loops in the risk assessment was solved in a simple and efficient way.http://www.joconline.com.cn/zh/article/74419519/vulnerabilityattack graphsclustering algorithmrisk adjacency matrix |
spellingShingle | YE Yun XU Xi-shan JIA Yan QI Zhi-chang CHENG Wen-cong Research on the risk adjacency matrix based on attack graphs Tongxin xuebao vulnerability attack graphs clustering algorithm risk adjacency matrix |
title | Research on the risk adjacency matrix based on attack graphs |
title_full | Research on the risk adjacency matrix based on attack graphs |
title_fullStr | Research on the risk adjacency matrix based on attack graphs |
title_full_unstemmed | Research on the risk adjacency matrix based on attack graphs |
title_short | Research on the risk adjacency matrix based on attack graphs |
title_sort | research on the risk adjacency matrix based on attack graphs |
topic | vulnerability attack graphs clustering algorithm risk adjacency matrix |
url | http://www.joconline.com.cn/zh/article/74419519/ |
work_keys_str_mv | AT yeyun researchontheriskadjacencymatrixbasedonattackgraphs AT xuxishan researchontheriskadjacencymatrixbasedonattackgraphs AT jiayan researchontheriskadjacencymatrixbasedonattackgraphs AT qizhichang researchontheriskadjacencymatrixbasedonattackgraphs AT chengwencong researchontheriskadjacencymatrixbasedonattackgraphs |