A Review on Network Attack Graph Technology

Bin-tao YUAN, Zu-lie PAN, Fan SHI

Abstract


The computer network has been an essential part of people’s life. However, with the development and popularization of the information technology, various cyber security vulnerabilities have been emerging. Because of the high price of repairing, troublesome hysteresis is inevitable when repairing the vulnerabilities. Furthermore, 0-day vulnerabilities are still unfamiliar to large number of manufacturers. Therefore, researchers come up with the attack graph technology, helping with locating important vulnerabilities and key nodes, to better analyze the state of the cyber security and reduce the strengthening costs. The attack graph technology mainly focuses on helping the administrator with network defense strategies, through making risk analysis in the network by assessing the vulnerable relationship among nodes. The attack generation technology shows the inefficiency of the present technology in application to large-scale network, but we can expect the proper development by combining with the artificial intelligence in the future.

Keywords


Cyber security, Vulnerabilities, Attack graph, Risk analysis


DOI
10.12783/dtetr/ecar2018/26351

Refbacks

  • There are currently no refbacks.