An Effective Method To Generate Attack Graph

Tao Zhang,MingZeng Hu,Dong Li,Liang Sun
DOI: https://doi.org/10.1109/icmlc.2005.1527624
2005-01-01
Abstract:As the traditional method, the result of vulnerability scanning can't directly reflect complex attack routes existing in network, so the attack graph is presented. After analyzing host computer, devices link relation and the characteristic of attack, the model of network security status was built. A forward-search, breadth-first and depth-limited (attack steps limited) algorithm is used to produce attack route, and the tools to generate the attack graph is implemented. The experiment validates the prototype of network attack graph generating tools, and contrasts our method to the other used.
What problem does this paper attempt to address?