• DocumentCode
    686186
  • Title

    Overview on attack graph generation and visualization technology

  • Author

    Shengwei Yi ; Yong Peng ; Qi Xiong ; Ting Wang ; Zhonghua Dai ; Haihui Gao ; JunFeng Xu ; Jiteng Wang ; Lijuan Xu

  • Author_Institution
    China Inf. Technol. Security Evaluation Center, Beijing, China
  • fYear
    2013
  • fDate
    25-27 Oct. 2013
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Network vulnerability can be analyzed automatically by attack graph. Attack graph tools can generate attack paths in network and show users the network vulnerabilities analyzing process for network security risk analysis. There are some problems such as state space explosion, the high complexity of algorithms, being difficult to demonstrate graphically, and so on, for attack graph generation and visualization techniques. Therefore, we surveyed and analyzed the attack graph generation and visualization technology. We summarized the open source tools like MulVAL, TVA. Attack Graph Toolkit, NetSPA and so on, and the commercial tools, for example, Cauldron, FireMon, Skybox View. We compared and analyzed these tools from the aspects of the attack graph types, scalability, or complexity of attack graph generation algorithm, the degree of attack graph visualization. Their common denominator was summarized, and their different points were analyzed. The future and applications for attack graph were forecasted, for example its applications in industrial control systems, and in the network security defense and risk assessment.
  • Keywords
    computer network security; data visualisation; graph theory; Cauldron; FireMon; MulVAL; NetSPA; Skybox View; TVA; algorithm complexity; attack graph generation algorithm; attack graph toolkit; attack graph tools; attack graph types; attack graph visualization technology; denominator; industrial control systems; network security defense; network security risk analysis; network vulnerability; open source tools; risk assessment; state space explosion; Algorithm design and analysis; Communication networks; Complexity theory; Databases; Risk analysis; Security; Visualization; Attack Graph; Attack Paths; Network Vulnerability Analysis; Visualization;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Anti-Counterfeiting, Security and Identification (ASID), 2013 IEEE International Conference on
  • Conference_Location
    Shanghai
  • Type

    conf

  • DOI
    10.1109/ICASID.2013.6825274
  • Filename
    6825274