parameter density, therefore, it could get an Approx-
Opt-Plan very close to the Opt-Plan by limited
amount of searches in the Plan-Space. The merits of
high-efficiency, controllable, and asymptotically
optimal, ensure that it could make full use of
available computing resource to find possible better
result, therefore very suitable for large-scale network.
7 CONCLUSIONS
In this paper, we proposed the Self-ad-MCNHA-
SLOS to address the MCNH problem using SLOS
and self-adaptive parameter adjust strategy. It could
find an approximate optimal hardening plan close
enough to the optimal hardening plan by limited
amount of searches, and has the merits of high-
efficiency, controllable and asymptotically optimal,
therefore, can make full use of available computing
resource to find possible better result, and is very
suitable for large-scale network environment.
Considering the Self-ad-MCNHA-SLOS’ ability of
transforming NP-hard problem to P-hard iterations,
we will study the generalization of the algorithm to
solve more hard problems in future.
ACKNOWLEDGEMENTS
This paper is supported by the National High
Technology Research and Development Program of
China (863 Program) under Grant
No.2009AA01Z432, the National Natural Science
Foundation of China under Grant No.60873215 and
the Hunan Provincial Natural Science Foundation of
China under Grant No.s2010J5050.
REFERENCES
S. Jha, etc., 2002. Two Formal Analyses of Attack Graphs.
In CSFW’02, 15th IEEE Computer Security
Foundations Workshop.
Steven Noel, etc., 2003. Efficient Minimum-Cost Network
Hardening Via Exploit Dependency Graphs. In
ACSAC’03, 19th Annual Computer Security
Applications Conference.
Lingyu Wang, etc., 2006. Minimum-Cost Network
Hardening Using Attack Graphs. Computer
Communications, Vol. 29, Issue 18, pp. 3812--3824.
John Homer, etc., 2008. From Attack Graphs to
Automated Configuration Management - An Iterative
Approach. Kansas State University Technical Report.
Feng Chen, etc., 2008. An Efficient Approach to
Minimum-Cost Network Hardening Using Attack
Graphs. In IAS’2008, 4th International Conference on
Information Assurance and Security.
Laura P. Swiler, etc., 2001. Computer-Attack Graph
Generation Tool. In DISCEX’01, DARPA Information
Survivability Conference &Exposition II.
Oleg Sheyner, etc., 2002. Automated Generation and
Analysis of Attack Graphs. In S&P’ 02, IEEE
Symposium on Security and Privacy.
Paul Ammann, etc., 2002. Scalable, Graph-Based Network
Vulnerability Analysis. In CCS’02, 9th ACM
conference on Computer and communications
security.
R. P. Lippmann, etc., 2005. Evaluating and Strengthening
Enterprise Network Security Using Attack Graphs.
Technical Report, MIT Lincoln Laboratory.
Xinming Ou, etc., 2005. MulVAL: A logic-based network
security analyzer. In 14th USENIX Security
Symposium.
Xinming Ou, etc., 2006. A scalable approach to attack
graph generation. In CCS’06, 13th ACM conference on
Computer and communications security.
Kyle Ingols, etc., 2006. Practical attack graph generation
for network defense. In ACSAC’06, 22nd Annual
Computer Security Applications Conference.
Feng Chen, etc., 2009. Two Scalable Approaches to
Analyzing Network Security Using Compact Attack
Graphs. In IEEC'09, International Symposium on
Information Engineering and Electronic Commerce.
Vaibhav Mehta, etc., 2006. Ranking attack graphs. In
RAID’06, Recent Advances in Intrusion Detection .
Richard Lippmann, etc., 2007. An interactive attack graph
cascade and reachability display. In VizSEC ’07, IEEE
Workshop on Visualization for Computer Security.
J. Homer, etc., 2008. Improving attack graph visualization
through data reduction and attack grouping. In
VizSEC’08, 5th International Workshop on
Visualization for Cyber Security.
Zhaohui Fu, etc., 2006. Solving the minimum-cost
satisfiability problem using sat based branch and
bound search. In ICCAD’06, International Conference
on Computer-Aided Design.
Xiaoyu Li, 2004. Optimization Algorithms for the
Minimum-Cost Satisfiability Problem. PhD thesis,
North Carolina State University.
Self-ad-MCNHA-SLOS - A Self-adaptive Minimum-Cost Network Hardening Algorithm based on Stochastic Loose
Optimize Strategy
377