Journal on Communications ›› 2017, Vol. 38 ›› Issue (11): 121-132.doi: 10.11959/j.issn.1000-436x.2017213

• Comprehensive Reviews • Previous Articles     Next Articles

Survey on application of attack graph technology

Zi-wei YE1,2,Yuan-bo GUO1,2,Chen-dong WANG1,2,An-kang JU1,2   

  1. 1 School of Cyberspace Security,PLA Information Engineering University,Zhengzhou 450001,China
    2 State Key Laboratory of Mathematical Engineering and Advanced Computing,Wuxi 214000,China
  • Revised:2017-11-06 Online:2017-11-01 Published:2017-12-13
  • Supported by:
    The National Natural Science Foundation of China(61602515);The National Natural Science Foundation of China(61501515)

Abstract:

Attack graph technology was a measure to predict the pattern and process used by attacker to compromise the target network,so as to guide defender to take defensive measures and improve network security.The basic component,types of attack graphs and respective advantages and disadvantages of each type were reviewed.The application status of attack graph technology in risk assessment and network hardening,intrusion detection and alarm correlation,and other aspects were introduced.Several kinds of existing attack graph generation and analysis tools were also presented.At last a survey of some challenges and research trends in future research work was provided.

Key words: attack graph, vulnerability, network hardening, alert correlation

CLC Number: 

No Suggested Reading articles found!