Paper
3 October 2022 Research on modeling method of network attack chain efficiency
Author Affiliations +
Proceedings Volume 12290, International Conference on Computer Network Security and Software Engineering (CNSSE 2022); 1229002 (2022) https://doi.org/10.1117/12.2640484
Event: International Conference on Computer Network Security and Software Engineering (CNSSE 2022), 2022, Zhuhai, China
Abstract
Based on achievement efficiency and time efficiency, this paper establishes the atomic attack efficiency model, and constructs the network attack efficiency model and the network attack chain efficiency model. In this model, to build a network host information security integrity test tree, leaf nodes can be considered as the vulnerabilities of each host in the target network, edges between the nodes can be seen as the attack methods of vulnerabilities, middle nodes can be considered as the attack results of vulnerabilities in their child nodes, the root node can be regarded as the integrity test of network host information security. Finally, the network attack chain efficiency model is constructed on the basis of the optimal network host information security integrity test efficiency. Experimental results verify the feasibility and effectiveness of the proposed method.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Keer Lu "Research on modeling method of network attack chain efficiency", Proc. SPIE 12290, International Conference on Computer Network Security and Software Engineering (CNSSE 2022), 1229002 (3 October 2022); https://doi.org/10.1117/12.2640484
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Information security

Databases

Computer networks

Computer security

Data conversion

Internet

RELATED CONTENT

Network systems security analysis
Proceedings of SPIE (May 14 2015)
An MR-based visualization system of IoT security
Proceedings of SPIE (June 01 2020)
A universal trust framework for pervasive computing
Proceedings of SPIE (March 29 2004)
Talk to me using voice server to enable business...
Proceedings of SPIE (December 29 2000)
Visualization for cyber security command and control
Proceedings of SPIE (April 28 2010)
Characterization of attacks on public telephone networks
Proceedings of SPIE (February 21 2001)

Back to Top