earticle

논문검색

Attack Graph Algorithm in the Application of Intrusion Detection System

초록

영어

In order to discover the network vulnerability timely and solve the very serious problems of network security, this paper puts forward the attack graph which is based on intrusion detection method. The method uses the generation global network attack graph algorithm to build network initial attack graph, and call attack graph optimization algorithm to remove global attack graph unreasonable path, and achieve the goal of simply attack graph. Finally, management personnel get the basis which is computed nodes in each state attack graph algorithms degree of loss to optimize the network security. Experiments show that the intrusion detection method is reasonable and effective, and has the advantages of simple and easy.

목차

Abstract
 1. Introduction
 2. Attack Graph Detection Model
  2.1. Related Definition
  2.2. Attack Graph Generating Algorithm
  2.3. Attack Graph Optimize Algorithm
  2.4. Calculate the Loss of State Node Degree Algorithm
 3. Network Security Policy Optimization Method
 4. Experiment
 5. Conclusions
 References

저자정보

  • Luo Zhiyong Harbin University of Science and Technology, Harbin, China
  • You Bo Harbin University of Science and Technology, Harbin, China
  • Xu Jiazhong Harbin University of Science and Technology, Harbin, China
  • Yu Guixin Harbin University of Science and Technology, Harbin, China
  • Liu Yahui Beijing Information Science and Technology University, Beijing, China

참고문헌

자료제공 : 네이버학술정보

    ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

    0개의 논문이 장바구니에 담겼습니다.