Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Network Pattern Analysis based Vulnerability Measurement using Attack Graph Hierarchical Visualization Approach

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 99 - Number 11
Year of Publication: 2014
Abhishek Pipliya
Sachin Chirgaiya

Abhishek Pipliya and Sachin Chirgaiya. Article: Network Pattern Analysis based Vulnerability Measurement using Attack Graph Hierarchical Visualization Approach. International Journal of Computer Applications 99(11):45-50, August 2014. Full text available. BibTeX

	author = {Abhishek Pipliya and Sachin Chirgaiya},
	title = {Article: Network Pattern Analysis based Vulnerability Measurement using Attack Graph Hierarchical Visualization Approach},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {99},
	number = {11},
	pages = {45-50},
	month = {August},
	note = {Full text available}


Network is growing very fast in terms of their users, technologies and devices integrated together for delivering the demanded communication services effectively. Such process requires lots of policies and configurations arrangements to improve availability and reliability of data. Most of the times these changes are performing the desired action but sometime the action or event is uncertain which let the systems performance down. These uncertain affects are due to sudden attack occurrence and cause degradations in service. These attacks are prevented using forecasting process by which attack pattern and impact are analysed. It is known as vulnerability assessment and attack removal. Larger is the data more accurate will be the attack patters detection from the data. Existing approaches and tools generates the weak and delayed output without any forecasted behaviours. This paper proposes a novel model NPA-VM approach for network vulnerability assessment using attack graphs and network metrics. The approach is capable of achieving its goal in real time. At the preliminary level of evaluation, proposed method is showing its strong holds in the area of attacks predictions.


  • Rongrong Xi, Shuyuan Jin, Xiaochun Yun and Yongzheng Zhang, "CNSSA: A Comprehensive Network Security Situation Awareness System", in International Joint Conference of IEEE TrustCom, ISSN: 978-0-7695-4600-1/11, doi: 10. 1109/TrustCom. 2011. 62, 2011.
  • Wang, C. Yao, A. Singhal and S. Jajodia, "Network Security Analysis Using Attack Graphs :Interactive Analysis of Attack Graphs using Relational Queries", in proceedings of IFIP WG Working Conference on Data and Application Security (DBSEC), 11. 3 pages 119-132, 2006.
  • Mr. Marc Grégoire and Mr. Luc Beaudoin, "Visualisation for Network Situational Awareness in Computer Network Defence", in proceedings of visualisation and the common operational picture meeting RTO-MP-IST-043, Paper 20. 2008.
  • White Paper on, "Public Safety and Homeland Security Situational Awareness", in ESRI, February 2008.
  • P. Barford, M. Dacier, T. G. Dietterich, M. Fredrikson, "Cyber SA: Situational Awareness", in Cyber Defense University of Wisconsin, 2009.
  • Rostyslav Barabanov, Stewart Kowalski and Louise Yngström, "Information Security Metrics", DSV Report series No 11-007, Mar 25, 2011
  • Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, and Sushil Jajodia, "An Attack Graph-Based Probabilistic Security Metric", in National Institute of Standards and Technology Computer Security Division; Concordia Institute for Information Systems Engineering, Montreal, Canada.
  • Marianne Swanson, Nadya Bartol, John Sabato, Joan Hash, and Laurie Graffo, "Security Metrics Guide for Information Technology Systems", in NIST Special Publication 800-55, July 2003.
  • William Streilein, Kendra Kratkiewicz, Michael Sikorski, Keith Piwowarski, Seth Webster, "PANEMOTO: Network Visualization of Security Situational Awareness through Passive Analysis ", in Workshop on Information Assurance United States Military Academy, Proceedings of the IEEE, 2007.
  • Rongzhen FAN, Mingkuai ZHOU, "Network Security Awareness and Tracking Method by GT", in Journal of Computational Information Systems, Binary Information Press, and ISSN: 1043-1050, Vol. 9: Issue 3, 2013.
  • Igor Kotenko and Andrew Chechulim, "Attack Modelling and Security Evaluation in SIEM System", in International Transaction of System Science and Application, SIWN Press,, ISSN:2051-5642, Vol. 8, Dec 2012.
  • Bon K. Sy, "Integrating intrusion alert information to aid forensic explanation: An analytical intrusion detection framework for distributive IDS", in Elsevier Journal of Information Fusion, ISSN: 1566-2535, doi:10. 1016/j. inffus. 2009. 01. 001, 2009.
  • Timothy Shimeall, Sidney Faber, Markus DeShon and Andrew Kompanek, "Using SiLK for Network Traffic Analysis", in CERT R Network Situational Awareness Group, Carnegie Mellon University. September 2010.
  • William Yurcik, "Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite", in 19th Large Installation System Administration Conference (LISA '05), 2005.
  • Xiaoxin Yin, William Yurcik and Michael Treaster, "VisFlowConnect: NetFlow Visualizations of Link Relationships for Security Situational Awareness", in ACM, doi: 1­58113­974­8/04/0010, Oct 2004.
  • Xiaoxin Yin, William Yurcik and Adam Slagell, "The Design of VisFlowConnect-IP: a Link Analysis System for IP Security", in National Center for Advanced Secure Systems Research (NCASSR), 2010.
  • Ji-Bao Lai, Hui-Qiang Wang, Xiao-Wu Liu and Ying Liang, "WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization", in Journal of computer science and technology, Vol. 23, Issue 3, ISSN: 0222:0230, Mar 2008.
  • SunJun Liu, Le Yu and Jin Yang, "Research on Network Security Situation Awareness Technology based on AIS", in International Journal of Knowledge and Language Processing, ISSN: 2191-2734, Volume 2, Number 2, April 2011.