An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception

HS Lallie, K Debattista, J Bal - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Perceiving and understanding cyber-attacks can be a difficult task. This problem is widely
recognized and welldocumented, and more effective techniques are needed to aid cyber …

A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers

AM Pirca, HS Lallie - Computers & Security, 2023 - Elsevier
Decision-makers struggle to understand cyber-security reports, sometimes leading to
inadequate cyber-attack responses. Attack modelling techniques (AMTs) can aid cyber …

An empirical test of the accuracy of an attack graph analysis tool

T Sommestad, F Sandström - Information & Computer Security, 2015 - emerald.com
Purpose–The purpose of this paper is to test the practical utility of attack graph analysis.
Attack graphs have been proposed as a viable solution to many problems in computer …

A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions

H Ahmetoglu, R Das - Internet of Things, 2022 - Elsevier
Rapid developments in network technologies and the amount and scope of data transferred
on networks are increasing day by day. Depending on this situation, the density and …

A framework for modeling cyber attack techniques from security vulnerability descriptions

H Binyamini, R Bitton, M Inokuchi, T Yagyu… - Proceedings of the 27th …, 2021 - dl.acm.org
Attack graphs are one of the main techniques used to automate the cybersecurity risk
assessment process. In order to derive a relevant attack graph, up-to-date information on …

[图书][B] An approach to graph-based modeling of network exploitations

W Li - 2005 - search.proquest.com
Computer security professionals and researchers are investigating proactive techniques for
studying network-based attack behavior. Attack modeling is one of these research areas. In …

Improving attack graph visualization through data reduction and attack grouping

J Homer, A Varikuti, X Ou, MA McQueen - Visualization for Computer …, 2008 - Springer
Various tools exist to analyze enterprise network systems and to produce attack graphs
detailing how attackers might penetrate into the system. These attack graphs, however, are …

AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports

Z Li, J Zeng, Y Chen, Z Liang - European Symposium on Research in …, 2022 - Springer
Cyber attacks are becoming more sophisticated and diverse, making attack detection
increasingly challenging. To combat these attacks, security practitioners actively summarize …

Attack hypotheses generation based on threat intelligence knowledge graph

FK Kaiser, U Dardik, A Elitzur… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Cyber threat intelligence on past attacks may help with attack reconstruction and the
prediction of the course of an ongoing attack by providing deeper understanding of the tools …