Special Issue Article
Inspection of Vulnerabilities through Attack Graphs and Analyzing Security Metrics Used For Measuring Security in A Network.
Cloud computing is now evolving like never before, with companies of all shapes and sizes adapting to this new technology. Industry experts believe that this trend will only continue to grow and develop even further in the coming few years. Storing information in the cloud could make vulnerable to external hack attacks and threats. As we are well aware, nothing on the Internet is completely secure. If any attack is detected the corresponding alert will be generated and it will be matched with the corresponding node in the attack graph. And finally countermeasure is applied to mitigate the attack progress. This paper discusses various attack graph construction and possible countermeasure selection techniques to stop the vulnerability from exploitation. And also identify the security of the network using security metrics such as VEA-bility metric also discussed.