An empirical test of the accuracy of an attack graph analysis tool

T Sommestad, F Sandström - Information & Computer Security, 2015 - emerald.com
Purpose–The purpose of this paper is to test the practical utility of attack graph analysis.
Attack graphs have been proposed as a viable solution to many problems in computer …

Towards unifying vulnerability information for attack graph construction

S Roschke, F Cheng, R Schuppenies… - Information Security: 12th …, 2009 - Springer
Attack graph is used as an effective method to model, analyze, and evaluate the security of
complicated computer systems or networks. The attack graph workflow consists of three …

Security risk analysis of enterprise networks using attack graphs

X Ou, A Singhal, X Ou, A Singhal - Quantitative Security Risk Assessment …, 2011 - Springer
In this chapter we present our methodology of security risk analysis of Enterprise Networks
using Attack Graphs. We explain our methodology using three examples. Attack graphs …

[PDF][PDF] An annotated review of past papers on attack graphs

RP Lippmann, KW Ingols - 2005 - Citeseer
This report reviews past research papers that describe how to construct attack graphs, how
to use them to improve security of computer networks, and how to use them to analyze alerts …

[PDF][PDF] Attack graph generation and analysis techniques

MS Barik, A Sengupta, C Mazumdar - Defence science journal, 2016 - core.ac.uk
As computer networks are emerging in everyday life, network security has become an
important issue. Simultaneously, attacks are becoming more sophisticated, making the …

A new approach for network vulnerability analysis

HL Vu, KK Khaw, TY Chen - The Computer Journal, 2015 - academic.oup.com
Despite a significant increase in security of modern information systems, cyber attacks have
become more sophisticated as attackers combine multiple vulnerabilities to penetrate …

Attack graph generation and analysis

JM Wing - Proceedings of the 2006 ACM Symposium on …, 2006 - dl.acm.org
Attack graphs represent the ways in which an adversary can exploit vulnerabilities to break
into a system. System administrators analyze these attack graphs to understand where their …

A taxonomy for attack graph generation and usage in network security

K Kaynar - Journal of Information Security and Applications, 2016 - Elsevier
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …

[PDF][PDF] A graph-based system for network-vulnerability analysis

C Phillips, LP Swiler - Proceedings of the 1998 workshop on New …, 1998 - dl.acm.org
This paper presents a graph-based approach to network vulnerability analysis. The method
is flexible, allowing analysis of attacks from both outside and inside the network. It can …

A systematic review of attack graph generation and analysis techniques

U Garg, G Sikka, LK Awasthi - Computer and Cyber Security, 2018 - taylorfrancis.com
This chapter discusses the systematic approach to gather an extensive database of
literatures focusing on the generation and analysis of attack graphs. As the technology is …