کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
458948 696208 2016 30 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
A taxonomy for attack graph generation and usage in network security
ترجمه فارسی عنوان
یک طبقه بندی برای تولید و استفاده از تکنولوژی حمله در امنیت شبکه
کلمات کلیدی
آسیب پذیری، گراف حمله کامل تجزیه و تحلیل قابل دستیابی، بهره برداری، ضعف
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی

Attack graphs model possible paths that a potential attacker can use to intrude into a target network. They can be used in determining both proactive and reactive security measures. Attack graph generation is a process that includes vulnerability information processing, collecting network topology and application information, determining reachability conditions among network hosts, and applying the core graph building algorithm. This article introduces a classification scheme for a systematical study of the methods applied in each phase of the attack graph generation process, including the usage of attack graphs for network security. The related works in the literature are stated based on the proposed classification scheme and contributive ideas about potential challenges and open issues for attack graph generation and usage are provided.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Information Security and Applications - Volume 29, August 2016, Pages 27–56
نویسندگان
,