[图书][B] An approach to graph-based modeling of network exploitations

W Li - 2005 - search.proquest.com
Computer security professionals and researchers are investigating proactive techniques for
studying network-based attack behavior. Attack modeling is one of these research areas. In …

[PDF][PDF] Finding optimal attack path using attack graphs: a survey

S Khaitan, S Raheja - International Journal of Soft Computing and …, 2011 - Citeseer
As the traditional methods, the result of vulnerability scanning can't directly reflect complex
attack routes existing in network, so the concept of attack graph comes. After analyzing host …

[PDF][PDF] Attack graph-based risk assessment and optimisation approach

M Alhomidi, M Reed - International Journal of Network Security & Its …, 2014 - Citeseer
Attack graphs are models that offer significant capabilities to analyse security in network
systems. An attack graph allows the representation of vulnerabilities, exploits and conditions …

Implementing interactive analysis of attack graphs using relational databases

L Wang, C Yao, A Singhal… - Journal of Computer …, 2008 - content.iospress.com
An attack graph models the causal relationships between vulnerabilities. Attack graphs have
important applications in protecting critical resources in networks against sophisticated multi …

MAGD: Minimal attack graph generation dynamically in cyber security

M Mohammadzad, J Karimpour, F Mahan - Computer Networks, 2023 - Elsevier
Cyber security faces challenges in detecting and mitigating complex attacks. Security
solutions have employed Attack Graphs (AGs) for modeling multi-stage attacks, but …

[HTML][HTML] Attack dynamics: An automatic attack graph generation framework based on system topology, CAPEC, CWE, and CVE databases

C Hankin, P Malacaria - Computers & Security, 2022 - Elsevier
Through a built-in security analysis feature based on metadata, this article provides a novel
framework that starts with a scenario input and produces a collection of visualizations based …

A scalable approach to attack graph generation

X Ou, WF Boyer, MA McQueen - … of the 13th ACM conference on …, 2006 - dl.acm.org
Attack graphs are important tools for analyzing security vulnerabilities in enterprise
networks. Previous work on attack graphs has not provided an account of the scalability of …

[PDF][PDF] Measuring security risk of networks using attack graphs

S Noel, S Jajodia, L Wang, A Singhal - International Journal of Next …, 2010 - csis.gmu.edu
Today's computer systems face sophisticated attackers who combine multiple vulnerabilities
to penetrate networks with devastating impact. The overall security of a network cannot be …

Distributed attack graph generation

K Kaynar, F Sivrikaya - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
Attack graphs show possible paths that an attacker can use to intrude into a target network
and gain privileges through series of vulnerability exploits. The computation of attack graphs …

[PDF][PDF] Evaluating and strengthening enterprise network security using attack graphs

RP Lippmann, KW Ingols, C Scott, K Piwowarski… - Project Report IA-2, MIT …, 2005 - Citeseer
Assessing the security of large enterprise networks is complex and labor intensive. Current
security analysis tools typically examine only individual firewalls, routers, or hosts separately …