[PDF][PDF] Cyber Attack Link Formation in a Network

S Rawther, S Sathyalakshmi - International Journal of Engineering …, 2023 - researchgate.net
The threat of cyber-attacks has become a major concern for organizations of all sizes. The
linkage between different components is an important factor in detecting and mitigating …

“Security Concern” as a Metric for Enterprise Business Processes

P Mukherjee, C Mazumdar - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
Measuring the security of business processes of enterprises has become essential in the
wake of different threat scenarios. During the last two decades, a lot of research has been …

[引用][C] 基于图论的网络安全分析方法研究与应用

汪渊, 蒋凡, 陈国良 - 小型微型计算机系统, 2003

Attack graph generation, visualization and analysis: issues and challenges

GS Bopche, BM Mehtre - … , SSCC 2014, Delhi, India, September 24-27 …, 2014 - Springer
In the current scenario, even the well-administered enterprise networks are extremely
susceptible to sophisticated multi-stage cyber attacks. These attacks combine multiple …

Success likelihood of ongoing attacks for intrusion detection and response systems

W Kanoun, N Cuppens-Boulahia… - 2009 International …, 2009 - ieeexplore.ieee.org
Intrusion Detection and Response Systems have become a core component in modern
security architectures. Current researches are combining intrusion detection and response …

A flexible approach to measuring network security using attack graphs

C Feng, S Jin-Shu - 2008 International Symposium on …, 2008 - ieeexplore.ieee.org
The previous approaches to measuring network security are most based on the hypothesis
that the related source data can be known well and truly. But in practice, it is very difficult to …

A vulnerability model of distributed systems based on reliability theory

冯萍慧, 连一峰, 戴英侠, 鲍旭华 - Journal of Software, 2006 - jos.org.cn
对现有的脆弱性分析方法进行分析和比较, 提出基于可靠性理论的分布式系统脆弱性模型.
针对影响分布式系统安全性的各项因素进行脆弱性建模, 利用模型检验方法构造系统的脆弱性 …

Entropy Analysis of Cyber-Attack Propagation in Network

S Rawther, S Sathyalakshmi - 2022 13th International …, 2022 - ieeexplore.ieee.org
The cyber-attack propagates in a network by forming the attack link with other nodes.
Though the choice of forming link is probabilistic, at equilibrium there is a tendency to form a …

Attack difficulty metric for assessment of network security

P Mukherjee, C Mazumdar - … of the 13th International Conference on …, 2018 - dl.acm.org
In recent days, organizational networks are becoming target of sophisticated multi-hop
attacks. Attack Graph has been proposed as a useful modeling tool for complex attack …

Management of security policy configuration using a Semantic Threat Graph approach

SN Foley, WM Fitzgerald - Journal of Computer Security, 2011 - content.iospress.com
Managing the configuration of heterogeneous enterprise security mechanisms is a complex
task. The effectiveness of a configuration may be constrained by poor understanding and/or …