Topological Vulnerability Analysis Approach

Read Complete Research Material



Topological Vulnerability Analysis Approach

Table of Contents

Summary3

Introduction4

Discussion4

Optimal Network Protection4

Intrusion Detection and Response5

Conclusion6

End Notes7

Bibliography8

Summary

Topological Vulnerability Analysis approach is a very effective approach for ensuring the security of the network. The reason of its success is the process and steps involved in this approach. The core process or element of TVA is Attack graphs that provide a powerful way of understanding the context and relative importance of vulnerabilities across systems and networks. Attack graph analysis depends on a complete and accurate model of the network. It can detect the intrusion or attack by using the intrusion detection sensors and then make changes in the network security or firewall to make network security stronger. It can also detect false alarm detection n of intrusion and cannot create burden on the network.

Topological Vulnerability Analysis Approach

Introduction

Topological Vulnerability analysis approach is a very effective approach that can provide ultimate security and protection to the networks It is a very effective approach for large networks as it does not creates a burden on the network. The core element working in the TVA is the Attack graph that is visualize and analyze to detect and eliminate the attacks or intrusion [2]. In this research paper we try to summarize the concepts of optimum network protection and intrusion detection and response. Optimum network protection is the adjustment of network to eliminate the effect of attack on the network or making it stronger against Attacks. While, on the other side, intrusion detection and response process is the process of detection of intrusion with the help of intrusion detection sensors.

Discussion

Optimal Network Protection

Attack graphs block used in TVA provides a very powerful approach that allows the system to develop a proactive approach for making the defense of the network more strong and powerful for upcoming attacks. In Optimal Network protection, multiple analytical techniques are used and available for Attack Graphs that allows it to detect and eliminate the risk of future attack and performs risk management [1]. Attack graph detects the future critical vulnerabilities and provides the basis to take steps for removing these attacks before they perform their work and attack network which is called the optimal network protection through the use of sophisticated techniques that based on the visualization of graph as thread or attack is detected by Attack graph. The scope of attack, its severity and what attack wants to do is also detect by Attack graph which is called Vulnerability Mitigation that provides so much support in understanding the nature of attack that helps in optimizing the protection of network. Another important part for assuring optimal protection of network is the visualization of Attack Graph. As all the protection process of network is based on the detection and visualization of Attack Graph; therefore, it is very important to effective visualize the Attack Graph to detect attacks effectively. In early days of TVA, it is the most complex task and its complexity is exponential but the abstraction of protection domain makes this task easy. For large networks, visualization of ...
Related Ads