Use of attack graphs in security systems

V Shandilya, CB Simmons… - Journal of Computer …, 2014 - Wiley Online Library
Attack graphs have been used to model the vulnerabilities of the systems and their potential
exploits. The successful exploits leading to the partial/total failure of the systems are subject …

[PDF][PDF] An evolutionary approach of attack graphs and attack trees: A survey of attack modeling

S Haque, M Keffeler, T Atkison - Proceedings of the International …, 2017 - dcsl.cs.ua.edu
The advancement of modern day computing has led to an increase of threats and intrusions.
As a result, advanced security measures and threat analysis models are necessary to detect …

[PDF][PDF] Attack graph generation and analysis techniques

MS Barik, A Sengupta, C Mazumdar - Defence science journal, 2016 - core.ac.uk
As computer networks are emerging in everyday life, network security has become an
important issue. Simultaneously, attacks are becoming more sophisticated, making the …

Towards unifying vulnerability information for attack graph construction

S Roschke, F Cheng, R Schuppenies… - Information Security: 12th …, 2009 - Springer
Attack graph is used as an effective method to model, analyze, and evaluate the security of
complicated computer systems or networks. The attack graph workflow consists of three …

A taxonomy for attack graph generation and usage in network security

K Kaynar - Journal of Information Security and Applications, 2016 - Elsevier
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …

Ranking attack graphs

V Mehta, C Bartzis, H Zhu, E Clarke, J Wing - International Workshop on …, 2006 - Springer
A majority of attacks on computer systems result from a combination of vulnerabilities
exploited by an intruder to break into the system. An Attack Graph is a general formalism …

Attack graph generation, visualization and analysis: issues and challenges

GS Bopche, BM Mehtre - … , SSCC 2014, Delhi, India, September 24-27 …, 2014 - Springer
In the current scenario, even the well-administered enterprise networks are extremely
susceptible to sophisticated multi-stage cyber attacks. These attacks combine multiple …

An annotated review of past papers on attack graphs

RP Lippmann, KW Ingols - 2005 - apps.dtic.mil
This report reviews past research papers that describe how to construct attack graphs, how
to use them to improve security of computer networks, and how to use them to analyze alerts …

Attack graphs representations

MA Alhomidi, MJ Reed - 2012 4th Computer Science and …, 2012 - ieeexplore.ieee.org
Attack graphs have been widely used to represent and analyze security attacks. More
specifically, they show all ways of how an attacker violets a security policy. Most attack …

A scalable approach to full attack graphs generation

F Chen, J Su, Y Zhang - Engineering Secure Software and Systems: First …, 2009 - Springer
Attack graphs are valuable vulnerabilities analysis tools to network defenders and may be
classified to two kinds by application. One is the partial attack graphs which illustrate the …