A taxonomy for attack graph generation and usage in network security

K Kaynar - Journal of Information Security and Applications, 2016 - Elsevier
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …

[PDF][PDF] Attack graph generation and analysis techniques

MS Barik, A Sengupta, C Mazumdar - Defence science journal, 2016 - core.ac.uk
As computer networks are emerging in everyday life, network security has become an
important issue. Simultaneously, attacks are becoming more sophisticated, making the …

Use of attack graphs in security systems

V Shandilya, CB Simmons… - Journal of Computer …, 2014 - Wiley Online Library
Attack graphs have been used to model the vulnerabilities of the systems and their potential
exploits. The successful exploits leading to the partial/total failure of the systems are subject …

Attack graph analysis: An explanatory guide

K Zenitani - Computers & Security, 2023 - Elsevier
Attack graph analysis is a model-based approach for network-security analysis. It analyzes a
directed graph called an attack graph. Usually, each node in it corresponds to a malicious …

[PDF][PDF] An annotated review of past papers on attack graphs

RP Lippmann, KW Ingols - 2005 - Citeseer
This report reviews past research papers that describe how to construct attack graphs, how
to use them to improve security of computer networks, and how to use them to analyze alerts …

Overview on attack graph generation and visualization technology

S Yi, Y Peng, Q Xiong, T Wang, Z Dai… - … Conference on Anti …, 2013 - ieeexplore.ieee.org
Network vulnerability can be analyzed automatically by attack graph. Attack graph tools can
generate attack paths in network and show users the network vulnerabilities analyzing …

A scalable approach to attack graph generation

X Ou, WF Boyer, MA McQueen - … of the 13th ACM conference on …, 2006 - dl.acm.org
Attack graphs are important tools for analyzing security vulnerabilities in enterprise
networks. Previous work on attack graphs has not provided an account of the scalability of …

A planner-based approach to generate and analyze minimal attack graph

N Ghosh, SK Ghosh - Applied Intelligence, 2012 - Springer
In the present scenario, even well administered networks are susceptible to sophisticated
cyber attacks. Such attack combines vulnerabilities existing on different systems/services …

[PDF][PDF] Evaluating and strengthening enterprise network security using attack graphs

RP Lippmann, KW Ingols, C Scott, K Piwowarski… - Project Report IA-2, MIT …, 2005 - Citeseer
Assessing the security of large enterprise networks is complex and labor intensive. Current
security analysis tools typically examine only individual firewalls, routers, or hosts separately …

Computer-attack graph generation tool

LP Swiler, C Phillips, D Ellis… - … and Exposition II …, 2001 - ieeexplore.ieee.org
This paper presents a tool for assessment of security attributes and vulnerabilities in
computer networks. The tool generates attack graphs (Phillips and Swiler, 1998). Each node …