Network hardening [electronic resource] : an automated approach to improving network security / Lingyu Wang, Massimiliano Alvanese, Sushil Jajodia.
2014
TK5105.59
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Network hardening [electronic resource] : an automated approach to improving network security / Lingyu Wang, Massimiliano Alvanese, Sushil Jajodia.
Author
Wang, Lingyu, author.
ISBN
9783319046112
331904611X
9783319046129electronic book
3319046128electronic book
331904611X
9783319046129electronic book
3319046128electronic book
Published
Cham ; New York : Springer, [2014]
Copyright
©2014
Language
English
Description
1 online resource
Item Number
10.1007/978-3-319-04612-9 doi
Call Number
TK5105.59
Dewey Decimal Classification
005.8
Summary
This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means of network defense than relying solely on the experience and skills of a human analyst. Key background information on attack graphs and network hardening helps readers understand the complexities of these tools and techniques. A common network hardening technique generates hardening solutions comprised of initially satisfied conditions, thereby making the solution more enforceable. Following a discussion of the complexity issues in this technique, the authors provide an improved technique that considers the dependencies between hardening options and employs a near-optimal approximation algorithm to scale linearly with the size of the inputs. Also included are automated solutions for hardening a network against sophisticated multi-step intrusions. Network Hardening: An Automated Approach to Improving Network Security is a valuable resource for researchers and professionals working in network security. It is also a useful tool for advanced-level students focused on security in computer science and electrical engineering.
Access Note
Access limited to authorized users.
Source of Description
Description based on print version record.
Series
SpringerBriefs in computer science.
Available in Other Form
Network hardening.
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Introduction
Related Work
Attack Graph and Network Hardening
Minimum-Cost Network Hardening
Linear-Time Network Hardening
Conclusion.
Related Work
Attack Graph and Network Hardening
Minimum-Cost Network Hardening
Linear-Time Network Hardening
Conclusion.