Based on achievement efficiency and time efficiency, this paper establishes the atomic attack efficiency model, and constructs the network attack efficiency model and the network attack chain efficiency model. In this model, to build a network host information security integrity test tree, leaf nodes can be considered as the vulnerabilities of each host in the target network, edges between the nodes can be seen as the attack methods of vulnerabilities, middle nodes can be considered as the attack results of vulnerabilities in their child nodes, the root node can be regarded as the integrity test of network host information security. Finally, the network attack chain efficiency model is constructed on the basis of the optimal network host information security integrity test efficiency. Experimental results verify the feasibility and effectiveness of the proposed method.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.