Aggregate attack surface management for network discovery of operational technology

T Ashley, SNG Gourisetti, N Brown, C Bonebrake - Computers & Security, 2022 - Elsevier
Interconnectivity has become a substratum of technology as the benefits of data-driven
functionality are being realized in nearly all industries. Increased connectivity of Operational …

An empirical test of the accuracy of an attack graph analysis tool

T Sommestad, F Sandström - Information & Computer Security, 2015 - emerald.com
Purpose–The purpose of this paper is to test the practical utility of attack graph analysis.
Attack graphs have been proposed as a viable solution to many problems in computer …

AUTOMA: Automated Generation of Attack Hypotheses and Their Variants for Threat Hunting Using Knowledge Discovery

B Nour, M Pourzandi, RK Qureshi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Threat hunting is a proactive security defense line exercised to uncover attacks that could
circumvent conventional detection mechanisms. It is based on an iterative approach to …

Attack graph generation, visualization and analysis: issues and challenges

GS Bopche, BM Mehtre - … , SSCC 2014, Delhi, India, September 24-27 …, 2014 - Springer
In the current scenario, even the well-administered enterprise networks are extremely
susceptible to sophisticated multi-stage cyber attacks. These attacks combine multiple …

[PDF][PDF] Detection and summarization of novel network attacks using data mining

L Ertoz, E Eilertson, A Lazarevic, P Tan… - Minnesota INtrusion …, 2003 - academia.edu
This paper introduces the Minnesota Intrusion Detection System (MINDS), which uses a
suite of data mining techniques to automatically detect attacks against computer networks …

A Survey on Network Attack Surface Mapping

D Everson, L Cheng - Digital Threats: Research and Practice, 2024 - dl.acm.org
Network services are processes running on a system with network exposure. A key activity
for any network defender, penetration tester, or red team is network attack surface mapping …

Attack intention analysis model for network forensics

M Rasmi, A Jantan - … , ICSECS 2011, Kuantan, Pahang, Malaysia, June 27 …, 2011 - Springer
In network forensics, attack intentions analyses play a major role to help and accelerate
decision-making for apprehending the real perpetrator. In fact, attack intention analysis is a …

GARNET: A graphical attack graph and reachability network evaluation tool

L Williams, R Lippmann, K Ingols - Visualization for Computer Security: 5th …, 2008 - Springer
Attack graphs enable computation of important network security metrics by revealing
potential attack paths an adversary could use to gain control of network assets. This paper …

[HTML][HTML] Attack dynamics: An automatic attack graph generation framework based on system topology, CAPEC, CWE, and CVE databases

C Hankin, P Malacaria - Computers & Security, 2022 - Elsevier
Through a built-in security analysis feature based on metadata, this article provides a novel
framework that starts with a scenario input and produces a collection of visualizations based …

Validating network attack concepts: A TCAV-driven approach

RR Rejimol Robinson, RR Prasad, C Thomas… - Journal of Computer …, 2024 - Springer
Nowadays, there is extensive research being conducted on the transparency and
interpretability of AI algorithms. The explanations of why and how these black-box …