American International Journal of Computer Science and Information Technology (AIJCSIT)

A COMPREHENSIVE STUDY ON SCALABLE ATTACK GRAPH GENERATION FOR NETWORK SECURITY

Authors

  • Engr. Olufemi Olatunji Adeboye Obafemi Awolowo University, Ile-Ife, Nigeria.
  • Dr. Jean-Claude Kouakou Gbocho Laboratoire LARIT, Cocody Danga, Abidjan, Côte d'Ivoire.

Abstract

In the contemporary landscape, computer networks have assumed pivotal roles within the global economy and national infrastructures. Their indispensability is palpable across diverse sectors encompassing economics, finance, and commerce. Network systems function as intricate amalgamations of software, services, and configurations, collectively orchestrated to facilitate seamless data communication. However, this complexity renders them inherently susceptible to a burgeoning array of vulnerabilities. Consequently, fortifying network security has emerged as a paramount challenge, necessitating comprehensive evaluation to shield against potential malicious intrusions. Intrusion prevention stands out as a potent strategy in fortifying network security, entailing the identification and mitigation of vulnerabilities or attack vectors within the network architecture. This proactive approach initiates with the detection of potential threats, equipping stakeholders with the critical understanding of attacker methodologies and potential exploit vectors. This knowledge forms the bedrock for preemptive security measures, ensuring the integrity and resilience of network systems prior to the implementation of network hardening protocols

Keywords:

Computer, Networks, Network Security Vulnerabilities, Intrusion Prevention, Malicious Intrusion

Published

2023-11-02

How to Cite

Adeboye, O. O., & Gbocho, J.-C. K. (2023). A COMPREHENSIVE STUDY ON SCALABLE ATTACK GRAPH GENERATION FOR NETWORK SECURITY. American International Journal of Computer Science and Information Technology (AIJCSIT), 8(3), 15–28. Retrieved from https://zapjournals.com/Journals/index.php/aijcsit/article/view/1481

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.