2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID) 2013
DOI: 10.1109/icasid.2013.6825274
|View full text |Cite
|
Sign up to set email alerts
|

Overview on attack graph generation and visualization technology

Abstract: Network vulnerability can be analyzed automatically by attack graph. Attack graph tools can generate attack paths in network and show users the network vulnerabilities analyzing process for network security risk analysis. There are some problems such as state space explosion, the high complexity of algorithms, being difficult to demonstrate graphically, and so on, for attack graph generation and visualization techniques. Therefore, we surveyed and analyzed the attack graph generation and visualization technolo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…Network vulnerability analysis using graph based approaches has been widely covered in the literature. A large body of work exists using attack graphs which propose approaches and tools for improved generation [17], [20], [29]- [31], visualization [32], [33], and analysis [19], [34], [35], or provide summaries of existing techniques [36]- [39]. Of the many types of attack graphs that exist, we have used dependency attack graphs, which facilitate understanding of the importance of individual vulnerabilities [40].…”
Section: Related Workmentioning
confidence: 99%
“…Network vulnerability analysis using graph based approaches has been widely covered in the literature. A large body of work exists using attack graphs which propose approaches and tools for improved generation [17], [20], [29]- [31], visualization [32], [33], and analysis [19], [34], [35], or provide summaries of existing techniques [36]- [39]. Of the many types of attack graphs that exist, we have used dependency attack graphs, which facilitate understanding of the importance of individual vulnerabilities [40].…”
Section: Related Workmentioning
confidence: 99%
“…From a practical perspective, the overview of attack graph tools was given by Yi et al [22]. The authors provide a comparison and analysis of both open source and commercial tools.…”
Section: Attack Graphs and Bayesian Networkmentioning
confidence: 99%
“…17 criteria have been identified and used for evaluating the quality of the algorithm. The selection was based on algorithm characteristics found on previous studies and current trends in risk management (Kaynar & Sivrikaya, 2016;Lever & Kifayat, 2016;Polatidis et al, 2018;Yi et al, 2013). The details, of the criteria can be found in appendix A, while the criteria are also presented briefly within table 3.…”
Section: Evaluation Criteriamentioning
confidence: 99%