Validating and restoring defense in depth using attack graphs

19-Jul-2017 00:00

To cope with a large amount of data in current sensed environments, decision aid tools should provide their understanding of situations in a time-efficient manner, so there is an increasing need for real-time network security situation awareness and threat assessment.

In this study, the state transition model of vulnerability in the network based on semi-Markov process is proposed at first.

validating and restoring defense in depth using attack graphs-56

appolo and julianne hough dating

These help administrators to insight into intrusion steps, determine security state and assess threat.Furthermore in order to improve accuracy of our algorithms, we adjust the probabilities that they exploit the vulnerability according to the attacker’s skill level.