Survey of attack projection, prediction, and forecasting in cyber security

M Husák, J Komárková, E Bou-Harb… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …

A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

A survey on systems security metrics

M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …

Dynamic security risk management using bayesian attack graphs

N Poolsappasit, R Dewri, I Ray - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security risk assessment and mitigation are two vital processes that need to be executed to
maintain a productive IT infrastructure. On one hand, models such as attack graphs and …

[PDF][PDF] 基于攻防博弈模型的网络安全测评和最优主动防御

姜伟, 方滨兴, 田志宏, 张宏莉 - 计算机学报, 2009 - cjc.ict.ac.cn
摘要为了进行网络信息系统安全测评和主动防御, 提出了网络防御图模型,
攻防策略分类及其成本量化方法, 网络攻防博弈模型和基于上述模型的最优主动防御选取算法 …

Assessing and augmenting SCADA cyber security: A survey of techniques

S Nazir, S Patel, D Patel - Computers & Security, 2017 - Elsevier
SCADA systems monitor and control critical infrastructures of national importance such as
power generation and distribution, water supply, transportation networks, and manufacturing …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

Cyber-insurance survey

A Marotta, F Martinelli, S Nanni, A Orlando… - Computer Science …, 2017 - Elsevier
Cyber insurance is a rapidly developing area which draws more and more attention of
practitioners and researchers. Insurance, an alternative way to deal with residual risks, was …

Automated generation and analysis of attack graphs

O Sheyner, J Haines, S Jha… - … IEEE Symposium on …, 2002 - ieeexplore.ieee.org
An integral part of modeling the global view of network security is constructing attack graphs.
Manual attack graph construction is tedious, error-prone, and impractical for attack graphs …

Scalable, graph-based network vulnerability analysis

P Ammann, D Wijesekera, S Kaushik - … of the 9th ACM Conference on …, 2002 - dl.acm.org
Even well administered networks are vulnerable to attack. Recent work in network security
has focused on the fact that combinations of exploits are the typical means by which an …