A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

A survey on systems security metrics

M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …

[PDF][PDF] 层次化网络安全威胁态势量化评估方法

陈秀真, 郑庆华, 管晓宏[1, 林晨光 - 2006 - Citeseer
安全评估是贯穿信息系统生命周期的重要管理手段, 是制定和调整安全策略的基础和前提.
只有充分识别系统安全风险, 才能有针对性地采取有效的安全防范措施. 基于IDS (intrusion …

Basic concepts and taxonomy of dependable and secure computing

A Avizienis, JC Laprie, B Randell… - IEEE transactions on …, 2004 - ieeexplore.ieee.org
This paper gives the main definitions relating to dependability, a generic concept including a
special case of such attributes as reliability, availability, safety, integrity, maintainability, etc …

Cyber-insurance survey

A Marotta, F Martinelli, S Nanni, A Orlando… - Computer Science …, 2017 - Elsevier
Cyber insurance is a rapidly developing area which draws more and more attention of
practitioners and researchers. Insurance, an alternative way to deal with residual risks, was …

Automated generation and analysis of attack graphs

O Sheyner, J Haines, S Jha… - … IEEE Symposium on …, 2002 - ieeexplore.ieee.org
An integral part of modeling the global view of network security is constructing attack graphs.
Manual attack graph construction is tedious, error-prone, and impractical for attack graphs …

[PDF][PDF] 基于攻防博弈模型的网络安全测评和最优主动防御

姜伟, 方滨兴, 田志宏, 张宏莉 - 计算机学报, 2009 - cjc.ict.ac.cn
摘要为了进行网络信息系统安全测评和主动防御, 提出了网络防御图模型,
攻防策略分类及其成本量化方法, 网络攻防博弈模型和基于上述模型的最优主动防御选取算法 …

Scalable, graph-based network vulnerability analysis

P Ammann, D Wijesekera, S Kaushik - … of the 9th ACM Conference on …, 2002 - dl.acm.org
Even well administered networks are vulnerable to attack. Recent work in network security
has focused on the fact that combinations of exploits are the typical means by which an …

An attack surface metric

PK Manadhata, JM Wing - IEEE Transactions on Software …, 2010 - ieeexplore.ieee.org
Measurement of software security is a long-standing challenge to the research community.
At the same time, practical security metrics and measurements are essential for secure …

Two formal analyses of attack graphs

S Jha, O Sheyner, J Wing - Proceedings 15th IEEE Computer …, 2002 - ieeexplore.ieee.org
An attack graph is a succinct representation of all paths through a system that end in a state
where an intruder has successfully achieved his goal. Today Red Teams determine the …