Extending Attack Graph-Based Security Metrics and Aggregating Their Application
#1

Abstract—The attack graph is an abstraction that reveals the ways an attacker can leverage vulnerabilities in a network to violate a security policy. When used with attack graph-based security metrics, the attack graph may be used to quantitatively assess security-relevant aspects of a network. The Shortest Path metric, the Number of Paths metric, and the Mean of Path Lengths metric are three attack graph-based security metrics that can extract security-relevant information. However, one's usage of these metrics can lead to misleading results. The Shortest Path metric and the Mean of Path Lengths metric fail to adequately account for the number of ways an attacker may violate a security policy. The Number of Paths metric fails to adequately account for the attack effort associated with the attack paths. To overcome these shortcomings, we propose a complimentary suite of attack graph-based security metrics and specify an algorithm for combining the usage of these metrics. We present simulated results that suggest that our approach reaches a conclusion about which of two attack graphs correspond to a network that is most secure in many instances.


projects9.com
Contact us : projects[at]projects9.com
Call us :8008855666
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ppt of cement types and their application, security metrics first data, sensors and their application in robotics, sensors and their application in robotics pdf, geotextile their application ppt download, rules of designing routing metrics for greedy face and combined greedy face routing, grouting their application ppttem in my sql,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,045 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 818 14-02-2017, 04:56 PM
Last Post: jaseela123d
  A New Cell-Counting-Based Attack against Tor 1 704 14-02-2017, 11:26 AM
Last Post: ijasti
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Security system using IP camera mechanical engineering crazy 5 4,324 16-03-2015, 02:52 PM
Last Post: seminar report asees
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,242 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,682 11-09-2014, 07:45 PM
Last Post: erhhk
  Developing a web application to transfer image and patient information project report maker 2 3,643 21-03-2014, 01:44 AM
Last Post: MichaelPn
  Online Application For The Training and Placement Dept. Of The College. Electrical Fan 16 9,553 13-03-2014, 05:46 PM
Last Post: computer topic
  ONLINE MISSING VEHICLE TRACKING APPLICATION FOR POLICE DEPARTMENT seminar class 3 4,663 17-10-2013, 07:54 PM
Last Post: Guest

Forum Jump: