Applying Genetic Algorithms for Minimization Analysis of Network Attack Graphs

Publish Year: 1384
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,234

This Paper With 7 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

این Paper در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ACCSI11_199

تاریخ نمایه سازی: 5 آذر 1390

Abstract:

Each attack scenario is a sequence of exploits launched by an intruder for a particular goal such as access to a database, service disruption, and so on. The collection of possible attack scenarios in a computer network can be represented by a directed graph, which is called network attack graph. In this directed graph, each path from an initial node to a goal node corresponds to an attack scenario. The aim of minimization analysis of network attack graphs is to find a minimum critical set of exploits that must be prevented to guarantee no attack scenario is possible. In this paper, we propose a genetic algorithm for minimization analysis of network attack graphs. A special dynamic fitness function has been used to improve the overall performance of the proposed genetic algorithm. We also report the results of applying this genetic algorithm for minimization analysis of a sample network attack graph consisting of 164 attack scenarios. The results of experiments show that our proposed genetic algorithm can be successfully used for minimization analysis of network attack graphs.

Authors

Mahdi Abadi

Department of Computer Engineering Tarbiat Modares University

Saeed Jalili

Department of Computer Engineering Tarbiat Modares University

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Abadi, M., and Jalili, S. Automatic Discovery of Network _ ...
  • Telecommu nications, Shiraz, September 2005, pp. 81-86. ...
  • 40 80 120 160 200 240 280 320 360 400 ...
  • 40 80 120 160 200 240 280 320 360 400 ...
  • Computer Security Foundations Workshop, Canada, June 2002. ...
  • Mitchell, M. An Introduction _ Genetic Algorithms, MIT Press. Cambridge, ...
  • NuSMV: A New Symbolic Mode] Checker. http :/afrodite.itc.t 1024/7nusmv/, 2005. ...
  • Phillips, C., and Swiler, L. P. A Graph-Based System for ...
  • Sheyner, O., Haines, J., Jha, S. Lippmann, R., and Wing, ...
  • Vose, M. D. The Simple Genetic Algorithm: Foundations and Theory. ...
  • _ of the _ _ _ Computer and Commun ications ...
  • Dacier, M., Deswartes, Y., and Kaaniche, M. Quantitative Assessment of ...
  • Deraison, R. Nessus Scanner. http ://www. nessus.org, 2005. ...
  • Goldberg, D. E. Genetic Algorithms in Search, Optimization and Machine ...
  • Jha, S., Sheyner, O., and Wing, J. M. Two Formal ...
  • نمایش کامل مراجع