A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

Dynamic security risk management using bayesian attack graphs

N Poolsappasit, R Dewri, I Ray - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security risk assessment and mitigation are two vital processes that need to be executed to
maintain a productive IT infrastructure. On one hand, models such as attack graphs and …

Automated generation and analysis of attack graphs

O Sheyner, J Haines, S Jha… - … IEEE Symposium on …, 2002 - ieeexplore.ieee.org
An integral part of modeling the global view of network security is constructing attack graphs.
Manual attack graph construction is tedious, error-prone, and impractical for attack graphs …

Scalable, graph-based network vulnerability analysis

P Ammann, D Wijesekera, S Kaushik - … of the 9th ACM Conference on …, 2002 - dl.acm.org
Even well administered networks are vulnerable to attack. Recent work in network security
has focused on the fact that combinations of exploits are the typical means by which an …

A scalable approach to attack graph generation

X Ou, WF Boyer, MA McQueen - … of the 13th ACM conference on …, 2006 - dl.acm.org
Attack graphs are important tools for analyzing security vulnerabilities in enterprise
networks. Previous work on attack graphs has not provided an account of the scalability of …

Two formal analyses of attack graphs

S Jha, O Sheyner, J Wing - Proceedings 15th IEEE Computer …, 2002 - ieeexplore.ieee.org
An attack graph is a succinct representation of all paths through a system that end in a state
where an intruder has successfully achieved his goal. Today Red Teams determine the …

Foundations of attack trees

S Mauw, M Oostdijk - Information Security and Cryptology-ICISC 2005: 8th …, 2006 - Springer
Attack trees have found their way to practice because they have proved to be an intuitive aid
in threat analysis. Despite, or perhaps thanks to, their apparent simplicity, they have not yet …

An attack graph-based probabilistic security metric

L Wang, T Islam, T Long, A Singhal… - Data and Applications …, 2008 - Springer
To protect critical resources in today's networked environments, it is desirable to quantify the
likelihood of potential multi-step attacks that combine multiple vulnerabilities. This now …

Topological analysis of network attack vulnerability

S Jajodia, S Noel, B O'berry - Managing Cyber Threats: Issues …, 2005 - Springer
To understand overall vulnerability to network attack, one must consider attacker exploits not
just in isolation, but also in combination. That is, one must analyze how low-level …