A Short-Normalized Attack Graph Based Approach for Network Attack Analysis
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Attack graphs are the graphs which describe attack scenarios, play important roles in analyzing network threats. These attack graphs are able to reveal such potential threats by evaluating the all possible sequences that an attacker can follow to compromise given critical resources or nodes. An Attack graph specifies an attack scenario that results in compromising network values. There are so many methods proposed to evaluate the network security in attack graphs. But no method specifies the overhead occurred due to the evaluation of network security at each and every node. This paper addresses the problem of overhead occurred due to the network security evaluation in Short-Normalizedattack graphs by evaluating a factor called network security risk. In this paper first the possible n valid attack paths are going to be calculated and then the security risk is going to be calculated for those n valid paths. This security risk denotes the amount of overhead occurred due to this evaluation.
Authors and Affiliations
Gouri R Patil , A. Damodaram
An Extended Approach for Online Testing of Reversible Circuits
Reversible computing has tremendous benefits in terms of power consumption, less heat dissipation and packaging density. Because its applications are found in diverse fields including quantum computing, nanotech...
Role of Fuzzy Set in Students’ Performance Prediction
Abstract: We can use educational data mining to predict student’ performance on the basis of different attribute. In this paper, the classification task is used to predict the result of students. Decision tree (DT) learn...
Skew Detection based on Bounding Edge Approximation
Abstract: Any paper document when converted to electronic form through standard digitizing devices, like scanners, is subject to a small tilt or skew. With recent advances of hand-held devices such as cell-phones,...
Facial Expression Recognition Using Artificial Neural Networks
In many face recognition systems the important part is face detection. The task of detecting face is complex due to its variability present across human faces including colour, pose, expression, position and...
Mapping and Analysis of Crime in Aurangabad City using GIS
Abstract: The study of Earth and its features with the help of Remote Sensing has lead to a fast growing and effective technology called Geographic Information System (GIS) where digital Maps and spatial data can be used...