Extending Attack Graph-Based Security Metrics and Aggregating Their Application
#1

Abstract—The attack graph is an abstraction that reveals the ways an attacker can leverage vulnerabilities in a network to violate a security policy. When used with attack graph-based security metrics, the attack graph may be used to quantitatively assess security-relevant aspects of a network. The Shortest Path metric, the Number of Paths metric, and the Mean of Path Lengths metric are three attack graph-based security metrics that can extract security-relevant information. However, one's usage of these metrics can lead to misleading results. The Shortest Path metric and the Mean of Path Lengths metric fail to adequately account for the number of ways an attacker may violate a security policy. The Number of Paths metric fails to adequately account for the attack effort associated with the attack paths. To overcome these shortcomings, we propose a complimentary suite of attack graph-based security metrics and specify an algorithm for combining the usage of these metrics. We present simulated results that suggest that our approach reaches a conclusion about which of two attack graphs correspond to a network that is most secure in many instances.


projects9.com
Contact us : projects[at]projects9.com
Call us :8008855666
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ectending attack graph based security metrics and aggregating their application ppt, project metrics examples**184 results, attack graph based security metrics ppt, pdf of coupling based structural metrics for measuring the quality of software, geotextile their application ppt download, metrics, ppt in coupling based metrics for measuring the quality of a software in java ieee project,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,047 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 824 14-02-2017, 04:56 PM
Last Post: jaseela123d
  A New Cell-Counting-Based Attack against Tor 1 711 14-02-2017, 11:26 AM
Last Post: ijasti
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Security system using IP camera mechanical engineering crazy 5 4,340 16-03-2015, 02:52 PM
Last Post: seminar report asees
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,249 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,685 11-09-2014, 07:45 PM
Last Post: erhhk
  Developing a web application to transfer image and patient information project report maker 2 3,649 21-03-2014, 01:44 AM
Last Post: MichaelPn
  Online Application For The Training and Placement Dept. Of The College. Electrical Fan 16 9,578 13-03-2014, 05:46 PM
Last Post: computer topic
  ONLINE MISSING VEHICLE TRACKING APPLICATION FOR POLICE DEPARTMENT seminar class 3 4,668 17-10-2013, 07:54 PM
Last Post: Guest

Forum Jump: