DocumentCode :
1949711
Title :
Some framework, Architecture and Approach for analysis a network vulnerability
Author :
Purboyo, Tito Waluyo ; Rahardjo, Budi ; Kuspriyanto
Author_Institution :
Sch. of Electr. Eng. & Inf., Inst. Teknol. Bandung, Bandung, Indonesia
fYear :
2012
fDate :
11-12 Sept. 2012
Firstpage :
1
Lastpage :
4
Abstract :
Network administrators must rely on labour-intensive processes for tracking network configurations and vulnerabilities, which requires a lot of expertise and error prone. Organizational network vulnerabilities and interdependencies are so complex to make traditional vulnerability analysis become inadequate. Decision support capabilities let analysts make tradeoffs between security and optimum availability, and indicates how best to apply limited security resources. Recent work in network security has focused on the fact that a combination of exploitation is the typical way in which the invader breaks into the network. Researchers have proposed various algorithms to generate graphs based attack tree (or graph). In this paper, we present a framework, Architecture and Approach to Vulnerability Analysis.
Keywords :
computer network security; trees (mathematics); attack graph; decision support capabilities; graphs based attack tree; labour-intensive processes; limited security resources; network configuration tracking; network security; network vulnerability tracking; vulnerability analysis; Algorithm design and analysis; Analytical models; Computer architecture; Engines; Measurement; Security; Software; Attack; Attack Graph; Network Security; Security Analysis; Vulnerability Analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
System Engineering and Technology (ICSET), 2012 International Conference on
Conference_Location :
Bandung
Print_ISBN :
978-1-4673-2375-8
Type :
conf
DOI :
10.1109/ICSEngT.2012.6339320
Filename :
6339320
Link To Document :
بازگشت