Su Ting-Ting, Pan Xiao-Zhong, Xiao Hai-Yan, Shen Jun-Wei. Research on Attack Graph Based on Attributes Adjacncy Matrix[J]. Journal of Electronics & Information Technology, 2012, 34(7): 1744-1747. doi: 10.3724/SP.J.1146.2012.00261
Citation:
Su Ting-Ting, Pan Xiao-Zhong, Xiao Hai-Yan, Shen Jun-Wei. Research on Attack Graph Based on Attributes Adjacncy Matrix[J]. Journal of Electronics & Information Technology, 2012, 34(7): 1744-1747. doi: 10.3724/SP.J.1146.2012.00261
Su Ting-Ting, Pan Xiao-Zhong, Xiao Hai-Yan, Shen Jun-Wei. Research on Attack Graph Based on Attributes Adjacncy Matrix[J]. Journal of Electronics & Information Technology, 2012, 34(7): 1744-1747. doi: 10.3724/SP.J.1146.2012.00261
Citation:
Su Ting-Ting, Pan Xiao-Zhong, Xiao Hai-Yan, Shen Jun-Wei. Research on Attack Graph Based on Attributes Adjacncy Matrix[J]. Journal of Electronics & Information Technology, 2012, 34(7): 1744-1747. doi: 10.3724/SP.J.1146.2012.00261
In order to extend visualization of attack graphs, a method of adjacency matrix based on attributes is proposed, and the arithmetic of multi-step adjacency matrix is designed. The elements of the matrix shows connections of the network. The probability of attack paths is obtained through numeration of probability of the adjacency matrix. Experiment results show that the proposed method can efficiently decrease the complexity of attack graphs, and make it easier to analyze the network vulnerability.