Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2012, Vol. 29 ›› Issue (4): 529-535.DOI: 10.7523/j.issn.2095-6134.2012.4.015

Previous Articles     Next Articles

Network-vulnerability evaluation method based on network centrality

JIA Wei1,2,3, FENG Deng-Guo2, LIAN Yi-Feng2,3   

  1. 1. Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei 230026, China;
    2. State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China;
    3. National Engineering Research Center for Information Security, Beijing 100080, China
  • Received:2011-04-15 Revised:2011-06-07 Online:2012-07-15

Abstract: We propose a method based on network centrality to evaluate the vulnerabilities of computer networks. We evaluate the attack costs based on CVSS and analyze the minimum attack cost routes by using the quantitative results. Then, we present a new network centrality method which combines betweenness with degree-theory to analyze the importance of the nodes in attack graph. The method helps us to find the key vulnerabilities which have great effect on network security and to enhance the network security.

Key words: vulnerability, vulnerabilities attack graph, network centrality, betweenness, attack cost

CLC Number: