A Short-Normalized Attack Graph Based Approach for Network Attack Analysis
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Attack graphs are the graphs which describe attack scenarios, play important roles in analyzing network threats. These attack graphs are able to reveal such potential threats by evaluating the all possible sequences that an attacker can follow to compromise given critical resources or nodes. An Attack graph specifies an attack scenario that results in compromising network values. There are so many methods proposed to evaluate the network security in attack graphs. But no method specifies the overhead occurred due to the evaluation of network security at each and every node. This paper addresses the problem of overhead occurred due to the network security evaluation in Short-Normalizedattack graphs by evaluating a factor called network security risk. In this paper first the possible n valid attack paths are going to be calculated and then the security risk is going to be calculated for those n valid paths. This security risk denotes the amount of overhead occurred due to this evaluation.
Authors and Affiliations
Gouri R Patil , A. Damodaram
An Enhanced Authentication System Using Face and Fingerprint Technologies
Abstract: The primary aim of this paper is to develop an enhanced authentication system using a CascadedLink Feed-Forward Neural Networks. In the end, the system overcomes some limitations of face recognition and fingerp...
Bluetooth Messenger: an Android Messenger app based on Bluetooth Connectivity
Abstract: The project discussed here is an Android messenger application which connects using Bluetooth. The main concepts discussed here are : i) Bluetooth connection between two or more android smart phones, wher...
Traffic Modeling of Wireless Body Area Network
Abstract: Wireless Body Area Network (WBAN) is required to provide quality of service (QoS) guarantees for transporting and processing life threatening gathered data. One important aspect of providing QoS guarantees unde...
Filter Based addressing protocol for effective Node Auto configuration in Ad hoc Network
MANET is used for many distributed network, the lack of a centralized administration makes these networks attractive for several distributed applications, such as sensing, Internet access to deprived communities, and dis...
Survey on adverse influencing factors in the way of successfulrequirement engineering
Abstract: Requirement engineering is the first phase for the development of any software. Software have beendiscarded due to poor and ambiguous requirements. This study based on the results of surveys conducted to...