作者
Urvashi Bansal, Geeta Sikka, Lalit K Awasthi, Bharat Bhargava
发表日期
2024/1/1
期刊
IEEE Transactions on Dependable and Secure Computing
卷号
21
期号
01
页码范围
298-308
出版商
IEEE Computer Society
简介
The significant expansion in network size to support new paradigms such as cloud computing, IoT (Internet of Things), etc. together with the exponential increase in vulnerabilities has challenged the existing security mechanisms greatly. These challenges have opened many avenues for research in network security. However, while attack graphs play an important role in analyzing vulnerabilities, analyzing large attack graphs itself is a major issue. Therefore, it is necessary to extract only the critical part of the attack graph. Although technologies have been developed for attack path characterization, there is a lack of hybrid technology that can differentiate between similar behavior attack paths. We have proposed a cost-based path characterization technique that takes the attack node's vulnerability complexity into account and significantly reduces the number of vulnerabilities that need to be patched to avoid the …
学术搜索中的文章
U Bansal, G Sikka, LK Awasthi, B Bhargava - IEEE Transactions on Dependable and Secure …, 2024