2017
DOI: 10.1007/978-3-319-64701-2_25
|View full text |Cite
|
Sign up to set email alerts
|

A Quantitative Method for Evaluating Network Security Based on Attack Graph

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…In [27], [28], PageRank [29] was utilized to evaluate the importance of nodes or states in an attack graph, which will improve the readability of the attack graph. In [5], the maximum reachable possibility of nodes based on the graph-based inference algorithm [30] were evaluated. The above studies conducted detailed analyses based on attack graphs.…”
Section: B the Attack Graph-based Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [27], [28], PageRank [29] was utilized to evaluate the importance of nodes or states in an attack graph, which will improve the readability of the attack graph. In [5], the maximum reachable possibility of nodes based on the graph-based inference algorithm [30] were evaluated. The above studies conducted detailed analyses based on attack graphs.…”
Section: B the Attack Graph-based Methodsmentioning
confidence: 99%
“…The attack graph-based method represents attack scenarios by showing possible attack paths from the attackers to the target. Many researchers have assessed network risks and modeled network threats based on attack graphs [5], [6]. The analysis of an attack graph will facilitate identifying critical exploitations of vulnerabilities, assets, and vulnerable configurations.…”
Section: Introductionmentioning
confidence: 99%
“…Reference 26 proposed to adjust the threat level according to the attacker's attack intention. Research, 27 on the other hand, presented a quantitative assessment method of network security from the importance of a node and its maximum reachability, and calculated the security risk value of the system by constructing a security assessment algorithm. Niakanlahiji et al 28 reported an approach that can predict IP addresses that are likely to be used in malicious activities.…”
Section: Active Defensementioning
confidence: 99%