HARMer: Cyber-attacks automation and evaluation

SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn… - IEEE …, 2020 - ieeexplore.ieee.org
With the increasing growth of cyber-attack incidences, it is important to develop innovative
and effective techniques to assess and defend networked systems against cyber attacks …

A practical framework for cyber defense generation, enforcement and evaluation

SY Enoch, CY Moon, D Lee, MK Ahn, DS Kim - Computer Networks, 2022 - Elsevier
It is challenging to enforce and evaluate cyber-defenses for large networks. The current state-
of-the-art approaches on defense enforcement and evaluations are manually performed by …

Scalable analysis of attack scenarios

M Albanese, S Jajodia, A Pugliese… - … on Research in …, 2011 - Springer
Attack graphs have been widely used for attack modeling, alert correlation, and prediction. In
order to address the limitations of current approaches–scalability and impact analysis–we …

GRAVITAS: Graphical reticulated attack vectors for Internet-of-Things aggregate security

J Brown, T Saha, NK Jha - IEEE Transactions on Emerging …, 2021 - ieeexplore.ieee.org
Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist of thousands of
devices connected in a complex network topology. The diversity and complexity of these …

Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach

S Moskal, SJ Yang, ME Kuhl - The Journal of Defense …, 2018 - journals.sagepub.com
Existing research on cyber threat assessment focuses on analyzing the network
vulnerabilities and producing possible attack graphs. Cyber attacks in real-world enterprise …

MITRE ATT&CK: State of the art and way forward

B Al-Sada, A Sadighian, G Oligeri - ACM Computing Surveys, 2024 - dl.acm.org
MITRE ATT&CK is a comprehensive framework of adversary tactics, techniques, and
procedures based on real-world observations. It has been used as a foundation for threat …

Toward an automated attack model for red teams

HT Ray, R Vemuri, HR Kantubhukta - IEEE Security & Privacy, 2005 - ieeexplore.ieee.org
To better understand system vulnerabilities, proactive security services use red teams that
simulate malicious attacks. The authors contend that an attack model with UML-based use …

[PDF][PDF] Cyber-Attack Penetration Test and Vulnerability Analysis.

D Stiawan, MY Idris, AH Abdullah… - … Journal of Online …, 2017 - repository.unsri.ac.id
Hacking attempts or cyber-attacks to information systems have recently evolved to be
sophisticated and deadly, resulting in such incidents as leakage of personal information and …

Aiming at higher network security through extensive penetration tests

A Bechtsoudis, N Sklavos - IEEE latin america transactions, 2012 - ieeexplore.ieee.org
Modern enterprise infrastructures adopt multilayer network architectures and heterogeneous
server environments in order to efficiently fulfill each organization's goals and objectives …

Analysis of cyber threat detection and emulation using mitre attack framework

P Rajesh, M Alam, M Tahernezhadi… - … on Intelligent Data …, 2022 - ieeexplore.ieee.org
With a rapid increase in Cyber-attacks, Threat hunters such as Cyber Threat Intelligence
(CTI) and their teams requires to analyze different techniques being employed by …