Figure 3: The attack graph.
It is concluded that the path and price as shown
in Table 3.
Table 3: Attack path cost.
Serial
number
Path Cost
1
( H0,H1, CVE-2014-4078 )
(H1,H2, CVE-2015-2441)
(H2,H4, CVE-2009-1930)
44.2
2
(H0,H1, CVE-2014-4078)
(H1,H3, CVE-2009-4565)
(H3,H4, CVE-2009-1930)
46
3
(H0,H1, CVE-2014-4078)
(H1,H3, CVE-2005-3524)
(H3,H4, CVE-2009-1930)
44.2
4
(H0,H1, CVE-2014-4078)
(H1,H4, CVE-2009-1930)
33.4
By Table 3 we know that the cost of path(H0,H1,
CVE-2014-4078 )
(H1,H4, CVE-2009-1930) is
the minimum cost. There are the lowest cost attack
from this path. The administrator may give
preference to fix vulnerabilities accordingly to
improve network security.
5 CONCLUSIONS
Today, modeling of network attack has been the
focus of attention. The attack graph technique has
the capacity to automatically discover the unknown
system vulnerabilities and the relationship between
vulnerabilities, it is currently a hot subject of
research. This paper gives a brief description of the
CVSS, and chooses the appropriate evaluation of
vulnerability to count attack cost. A network attack
model based on attack cost of CVSS and breadth-
first forward exploration is designed. In the
algorithm, the method of time correction and
controlling the graph size are adopted. The
experiment result shows that the best attack paths
can be effectively doped out, simplify the attack
graph generation, and improve the efficiency of
network penetration testing.
ACKNOWLEDGEMENTS
The work was supported by "twelfth five-year"
science and technology research project of jilin
province department of education with the project
number 2012247.
REFERENCES
Swiler LP, Phillips C, Gaylor T. A Graph Based Network
Vulnerability Analysis System, SAND97-3010/1.
Sandia National Laboratories, Albuquerque,
NewMexico and Livermore, California, 1998.
Danforth M. Models for Threat Assessment in Networks.
University of California-davis, 2006.
Ritchy RW. Efficient Network Attack Graph Generation.
George Mason University, 2007.
Templeton S T. A Requires Provides Model for Computer
Attacks. Proceedings of the New Security Paradigms
Workshop, Cork Ireland, 2000:31-38.
ORTALO R, DESWARTES Y, KAANICHE M.
Experimenting with quantitative evaluation tools for
monitoring operational security. IEEE Transactions
on Software Engineering, 1999, 25(5):633-650.
Ou XM, BoyerWF. A Scalable Approach to Attack Graph
Generation. Proceedings of the 13th ACM Conference
on Computer and Communications Security,
2006:336-345.
SCHNEIER B. Secrets and Lies. John Wiley and Sons,
Creating Secure Systems through Attack Tree
Modeling. Resources Red Teaming Articles and
Papers, Amenaza Technologies Limited. 2003.
SHEYNER O. Scenario Graphs and Attack Graphs.
School of Computer Science Department, Carnegie
Mellon University, 2004.
Peter Mell, Karen Scarfone, Sasha Romanosky. A
Complete Guide to the Common Vulnerability Scoring
System Version 2.0. http://www.first.org/cvss/v2/guide
A technical community for symantec.
http://www.securityfocus.com/.
Common Vulnerabilities and Exposures.
http://cve.scap.org.cn/.
Li Lingjuan,SUN Guanghui, Research on Algorithm of
Generating Network Attack Graph. Computer
Technology and Development. 2010.10. (in Chinese).
Chen Feng, Mao handong, Zhang Weiming, Lei Changhai.
Survey of Attack Graph Technique. Computer Science.
2011.11. (in Chinese).
Zhang Xi, Huang Shuguang, Xia Yang, Song Shunhong.
Attack graph based method for vulnerability risk
Algorithm of Attack Graph Generation based on Attack Cost of CVSS
475