Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2009, Vol. 32 ›› Issue (1): 113-117.doi: 10.13190/jbupt.200901.113.chentp

• Reports • Previous Articles     Next Articles

Application of Graph Theory in Threat Situation Analysis of Network Security

CHEH Tian-Ping   

  • Received:2008-09-16 Revised:2008-12-12 Online:2009-01-28 Published:2009-01-28
  • Contact: CHEH Tian-Ping

Abstract:

A new threat situation analysis based on the network graph model is presented. The attack cost of adjacent nodes is defined, and the multi-attribute utility theory is adopted to quantify its value. The graph edges are endowed with the weight representing the attack cost, and the threat situation of network node is also analyzed by the shortest accessible path arithmetic. The case study demonstrated that the method is concise and effective, that will help to optimize the safety strategy.

Key words: network security, graph theory model, attack cost, threat road