Computer-attack graph generation tool

LP Swiler, C Phillips, D Ellis… - … and Exposition II …, 2001 - ieeexplore.ieee.org
This paper presents a tool for assessment of security attributes and vulnerabilities in
computer networks. The tool generates attack graphs (Phillips and Swiler, 1998). Each node …

[PDF][PDF] A graph-based system for network-vulnerability analysis

C Phillips, LP Swiler - Proceedings of the 1998 workshop on New …, 1998 - dl.acm.org
This paper presents a graph-based approach to network vulnerability analysis. The method
is flexible, allowing analysis of attacks from both outside and inside the network. It can …

[PDF][PDF] An annotated review of past papers on attack graphs

RP Lippmann, KW Ingols - 2005 - Citeseer
This report reviews past research papers that describe how to construct attack graphs, how
to use them to improve security of computer networks, and how to use them to analyze alerts …

A graph-based network-vulnerability analysis system

LP Swiler, C Phillips, T Gaylor - 1998 - osti.gov
This report presents a graph-based approach to network vulnerability analysis. The method
is flexible, allowing analysis of attacks from both outside and inside the network. It can …

Practical attack graph generation for network defense

K Ingols, R Lippmann… - 2006 22nd Annual …, 2006 - ieeexplore.ieee.org
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use
to gain access to a targeted network. Defenders can then focus their efforts on patching the …

[PDF][PDF] Attack graph generation and analysis techniques

MS Barik, A Sengupta, C Mazumdar - Defence science journal, 2016 - core.ac.uk
As computer networks are emerging in everyday life, network security has become an
important issue. Simultaneously, attacks are becoming more sophisticated, making the …

Toward measuring network security using attack graphs

L Wang, A Singhal, S Jajodia - Proceedings of the 2007 ACM workshop …, 2007 - dl.acm.org
In measuring the overall security of a network, a crucial issue is to correctly compose the
measure of individual components. Incorrect compositions may lead to misleading results …

Ranking attack graphs

V Mehta, C Bartzis, H Zhu, E Clarke, J Wing - International Workshop on …, 2006 - Springer
A majority of attacks on computer systems result from a combination of vulnerabilities
exploited by an intruder to break into the system. An Attack Graph is a general formalism …

A taxonomy for attack graph generation and usage in network security

K Kaynar - Journal of Information Security and Applications, 2016 - Elsevier
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …

GARNET: A graphical attack graph and reachability network evaluation tool

L Williams, R Lippmann, K Ingols - Visualization for Computer Security: 5th …, 2008 - Springer
Attack graphs enable computation of important network security metrics by revealing
potential attack paths an adversary could use to gain control of network assets. This paper …