Share Email Print
cover

Proceedings Paper

A novel method for host risk assessment based on predecessor attack
Author(s): Xiao-song Zhang; Lei Huang; Chun-xiang Xu; Ting Chen
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

It is universally admitted that propagable attacks pose a more serious threat to network than a single attack. And the propagation of attacks mainly depends on vulnerabilities. Popular vulnerabilities assessment tools are able to detect hosts' vulnerabilities in detail and produce the related reports. However they always ignore the threats led by predecessor attacks from other hosts in the network, because they do not take the network conditions into consideration. In this paper, digraph is used to generate the attack paths by virtue of network and vulnerabilities information. And according to the attacks relationship of hosts, the risk of predecessor attack is considered for the general risk calculation of target hosts. A method is presented to assess the risk of hosts in network environment qualitatively and quantitatively.

Paper Details

Date Published: 1 October 2011
PDF: 7 pages
Proc. SPIE 8285, International Conference on Graphic and Image Processing (ICGIP 2011), 82854J (1 October 2011); doi: 10.1117/12.913276
Show Author Affiliations
Xiao-song Zhang, Univ. of Electronic Science and Technology of China (China)
Lei Huang, Univ. of Electronic Science and Technology of China (China)
Chun-xiang Xu, Univ. of Electronic Science and Technology of China (China)
Ting Chen, Univ. of Electronic Science and Technology of China (China)


Published in SPIE Proceedings Vol. 8285:
International Conference on Graphic and Image Processing (ICGIP 2011)
Yi Xie; Yanjun Zheng, Editor(s)

© SPIE. Terms of Use
Back to Top