Security assessment of computer networks based on attack graphs and security events

I Kotenko, E Doynikova - … Communication Technology: Second IFIP TC5/8 …, 2014 - Springer
Security assessment is an important task for operation of modern computer networks. The
paper suggests the security assessment technique based on attack graphs which can be …

[PDF][PDF] Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing.

IV Kotenko, E Doynikova - J. Wirel. Mob. Networks Ubiquitous Comput …, 2014 - isyou.info
The paper is devoted to the security assessment problem. Authors suggest an approach to
the security assessment based on the attack graphs that can be implemented in …

An attack graph based metric for security evaluation of computer networks

M Keramati, A Akbari - 6th International Symposium on …, 2012 - ieeexplore.ieee.org
Nowadays computer networks face with multi-step attacks, during which, intruder exploits
multiple vulnerabilities in a specific manner to attack his victim. So for assessing network …

CVSS-based security metrics for quantitative analysis of attack graphs

M Keramati, A Akbari, M Keramati - ICCKE 2013, 2013 - ieeexplore.ieee.org
Attack graphs are efficient tools for detecting possible attacks in the network and their
causes. By analyzing attack graphs and eliminating causes of attacks in the networks, we …

Analysis of attack graph-based metrics for quantification of network security

A Kundu, N Ghosh, I Chokshi… - 2012 Annual IEEE India …, 2012 - ieeexplore.ieee.org
Computer network has grown both in size and complexity with the advent of Internet. It
facilitates easy access to vast store of reference materials, collaborative computing, and …

Attack graph based evaluation of network security

I Kotenko, M Stepashkin - … and Multimedia Security: 10th IFIP TC-6 TC-11 …, 2006 - Springer
The perspective directions in evaluating network security are simulating possible
malefactor's actions, building the representation of these actions as attack graphs (trees …

Fast network attack modeling and security evaluation based on attack graphs

I Kotenko, A Chechulin - Journal of Cyber Security and …, 2014 - journals.riverpublishers.com
The paper suggests an approach to network attack modeling and security evaluation which
is realized in advanced Security Information and Event Management (SIEM) systems. It is …

Novel security metrics for ranking vulnerabilities in computer networks

M Keramati, M Keramati - 7'th International Symposium on …, 2014 - ieeexplore.ieee.org
By daily increasing appearance of vulnerabilities and various ways of intruding networks,
one of the most important fields in network security will be doing network hardening and this …

Extending attack graph-based security metrics and aggregating their application

N Idika, B Bhargava - IEEE Transactions on dependable and …, 2010 - ieeexplore.ieee.org
The attack graph is an abstraction that reveals the ways an attacker can leverage
vulnerabilities in a network to violate a security policy. When used with attack graph-based …

Selection of countermeasures against network attacks based on dynamical calculation of security metrics

I Kotenko, E Doynikova - The Journal of Defense Modeling …, 2018 - journals.sagepub.com
This paper considers the issue of countermeasure selection for ongoing computer network
attacks. We outline several challenges that should be overcome for the efficient response …