مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

337
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

166
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

AN ANT COLONY OPTIMIZATION VULNERABILITY ANALYSIS ALGORITHM FOR NETWORK

Pages

  106-120

Abstract

 Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called NETWORK ATTACK GRAPH (NAG). The aim of minimization analysis of NETWORK ATTACK GRAPHs is to find a minimum critical set of exploits that completely disconnect the initial nodes and the goal nodes of the graph. In this paper, we present an ANT COLONY OPTIMIZATION algorithm, called AntNAG, for minimization analysis of large-scale NETWORK ATTACK GRAPHs. Each ant constructs a critical set of exploits. A local search heuristic has been used to improve the overall performance of the algorithm. The aim is to find a minimum critical set of exploits that must be prevented to guarantee no attack scenario is possible. We compare the performance of the AntNAG with a greedy algorithm for minimization analysis of several large-scale NETWORK ATTACK GRAPHs. The results of the experiments show that the AntNAG can be successfully used for minimization analysis of large-scale NETWORK ATTACK GRAPHs.

Multimedia

  • No record.
  • Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    ABADI, MAHDI, & JALALI, S.. (2006). AN ANT COLONY OPTIMIZATION VULNERABILITY ANALYSIS ALGORITHM FOR NETWORK. IRANIAN JOURNAL OF ELECTRICAL AND ELECTRONIC ENGINEERING, 2(3-4), 106-120. SID. https://sid.ir/paper/299698/en

    Vancouver: Copy

    ABADI MAHDI, JALALI S.. AN ANT COLONY OPTIMIZATION VULNERABILITY ANALYSIS ALGORITHM FOR NETWORK. IRANIAN JOURNAL OF ELECTRICAL AND ELECTRONIC ENGINEERING[Internet]. 2006;2(3-4):106-120. Available from: https://sid.ir/paper/299698/en

    IEEE: Copy

    MAHDI ABADI, and S. JALALI, “AN ANT COLONY OPTIMIZATION VULNERABILITY ANALYSIS ALGORITHM FOR NETWORK,” IRANIAN JOURNAL OF ELECTRICAL AND ELECTRONIC ENGINEERING, vol. 2, no. 3-4, pp. 106–120, 2006, [Online]. Available: https://sid.ir/paper/299698/en

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button