Yuan Feng, Ludan Wang, Jianwei Zhang, Zengyu Cai, Yong Gan
{"title":"Generation Method of Network Attack Graph Based On Greedy Heuristic Algorithm","authors":"Yuan Feng, Ludan Wang, Jianwei Zhang, Zengyu Cai, Yong Gan","doi":"10.14257/ijhit.2017.10.6.03","DOIUrl":null,"url":null,"abstract":"mailfengy@163.com Abstract State explosion has become a serious problem of attack graph generation method, which results in a large-scale attack graph. Attackers always try to infiltrate into the internal network quickly, access to the more important host directly and get higher access right. The model of network attack graph generation is established based on these premises. The model expands network state node according to the evaluation function. If the valuation function value is smaller, it is the priority to expand. The evaluation value is calculated by the path length, attack difficulty, type of target host and authority obtained after the attack. Experimental results show that the network attack graph generation method based on greedy heuristic algorithm can do well in network attack graph generation, and it has a lower time complexity and good scalability. The research for this article has a great significance to improve the usefulness of network attack","PeriodicalId":170772,"journal":{"name":"International Journal of Hybrid Information Technology","volume":"141 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Hybrid Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/ijhit.2017.10.6.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
mailfengy@163.com Abstract State explosion has become a serious problem of attack graph generation method, which results in a large-scale attack graph. Attackers always try to infiltrate into the internal network quickly, access to the more important host directly and get higher access right. The model of network attack graph generation is established based on these premises. The model expands network state node according to the evaluation function. If the valuation function value is smaller, it is the priority to expand. The evaluation value is calculated by the path length, attack difficulty, type of target host and authority obtained after the attack. Experimental results show that the network attack graph generation method based on greedy heuristic algorithm can do well in network attack graph generation, and it has a lower time complexity and good scalability. The research for this article has a great significance to improve the usefulness of network attack