Prikladnaya Diskretnaya Matematika. Supplement
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat. Suppl.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Prikladnaya Diskretnaya Matematika. Supplement, 2018, Issue 11, Pages 90–95
DOI: https://doi.org/10.17223/2226308X/11/28
(Mi pdma381)
 

Mathematical Foundations of Computer Security

An effective algorithm for building a set of the shortest attacks within the context of one model of attack development in computer networks

D. E. Gorbatenkoa, A. A. Semenovb

a Irkutsk State University, Irkutsk
b Matrosov Institute for System Dynamics and Control Theory of Siberian Branch of Russian Academy of Sciences, Irkutsk
References:
Abstract: In the paper, we present an algorithm to extract a set of shortest attacks within the context of one particular model of attack development in a computer network. This model does not make it possible to construct attack graphs with the asymptotically greatest number of vertices. However, the graphs constructed within the model do not contain loops, thus making it possible to correctly define the length of attack. The model represents the development of attacks as a discrete dynamical process. Similar to the most models of attack development, it possesses the monotonicity property. The consequence of this is a simple structure of a State Transition Graph (STG) of Discrete Dynamical System describing a development of attacks in the considered model. We propose an algorithm, which can extract from a particular STG an attack graph and a subgraph representing all the shortest attacks in a considered computer network. The algorithm for extracting the set of the shortest attacks under standard assumptions (when the number of vulnerabilities and atomic attacks are constants that do not depend on a network size) has the complexity of $\mathrm O(n^2)$ where $n$ is the number of hosts in a network.
Keywords: attacks in computer networks, attack graphs, discrete dynamical systems.
Funding agency Grant number
Russian Science Foundation 16-11-10046
Bibliographic databases:
Document Type: Article
UDC: 519.7
Language: Russian
Citation: D. E. Gorbatenko, A. A. Semenov, “An effective algorithm for building a set of the shortest attacks within the context of one model of attack development in computer networks”, Prikl. Diskr. Mat. Suppl., 2018, no. 11, 90–95
Citation in format AMSBIB
\Bibitem{GorSem18}
\by D.~E.~Gorbatenko, A.~A.~Semenov
\paper An effective algorithm for building a~set of the shortest attacks within the context of one model of attack development in computer networks
\jour Prikl. Diskr. Mat. Suppl.
\yr 2018
\issue 11
\pages 90--95
\mathnet{http://mi.mathnet.ru/pdma381}
\crossref{https://doi.org/10.17223/2226308X/11/28}
\elib{https://elibrary.ru/item.asp?id=35557611}
Linking options:
  • https://www.mathnet.ru/eng/pdma381
  • https://www.mathnet.ru/eng/pdma/y2018/i11/p90
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Prikladnaya Diskretnaya Matematika. Supplement
    Statistics & downloads:
    Abstract page:136
    Full-text PDF :50
    References:29
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024