Abstract

The computer network has been an essential part of people’s life. However, with the development and popularization of the information technology, various cyber security vulnerabilities have been emerging. Because of the high price of repairing, troublesome hysteresis is inevitable when repairing the vulnerabilities. Furthermore, 0-day vulnerabilities are still unfamiliar to large number of manufacturers. Therefore, researchers come up with the attack graph technology, helping with locating important vulnerabilities and key nodes, to better analyze the state of the cyber security and reduce the strengthening costs. The attack graph technology mainly focuses on helping the administrator with network defense strategies, through making risk analysis in the network by assessing the vulnerable relationship among nodes. The attack generation technology shows the inefficiency of the present technology in application to large-scale network, but we can expect the proper development by combining with the artificial intelligence in the future.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call