An attack graph-based probabilistic security metric

L Wang, T Islam, T Long, A Singhal… - Data and Applications …, 2008 - Springer
To protect critical resources in today's networked environments, it is desirable to quantify the
likelihood of potential multi-step attacks that combine multiple vulnerabilities. This now …

[PDF][PDF] A sound and practical approach to quantifying security risk in enterprise networks

J Homer, X Ou, D Schmidt - Kansas State University Technical Report, 2009 - Citeseer
Mitigation of security risk is an important task in enterprise network security management.
However it is presently a skill acquired by individual experience, more an art than a science …

Measuring the overall security of network configurations using attack graphs

L Wang, A Singhal, S Jajodia - IFIP annual conference on data and …, 2007 - Springer
Today's computer systems face sophisticated intrusions during which multiple vulnerabilities
can be combined for reaching an attack goal. The overall security of a network system …

Aggregating vulnerability metrics in enterprise networks using attack graphs

J Homer, S Zhang, X Ou, D Schmidt… - Journal of …, 2013 - content.iospress.com
Quantifying security risk is an important and yet difficult task in enterprise network security
management. While metrics exist for individual software vulnerabilities, there is currently no …

Toward measuring network security using attack graphs

L Wang, A Singhal, S Jajodia - Proceedings of the 2007 ACM workshop …, 2007 - dl.acm.org
In measuring the overall security of a network, a crucial issue is to correctly compose the
measure of individual components. Incorrect compositions may lead to misleading results …

Measuring network security using bayesian network-based attack graphs

M Frigault, L Wang - 2008 32nd Annual IEEE International …, 2008 - ieeexplore.ieee.org
Given the increasing dependence of our societies on information systems, the overall
security of these systems should be measured and improved. Existing work generally …

Extending attack graph-based security metrics and aggregating their application

N Idika, B Bhargava - IEEE Transactions on dependable and …, 2010 - ieeexplore.ieee.org
The attack graph is an abstraction that reveals the ways an attacker can leverage
vulnerabilities in a network to violate a security policy. When used with attack graph-based …

[图书][B] Security risk analysis of enterprise networks using probabilistic attack graphs

L Wang, S Jajodia, A Singhal, A Singhal, X Ou - 2017 - Springer
Today's information systems face sophisticated attackers who combine multiple
vulnerabilities to penetrate networks with devastating impact. The overall security of an …

[PDF][PDF] Measuring security risk of networks using attack graphs

S Noel, S Jajodia, L Wang, A Singhal - International Journal of Next …, 2010 - csis.gmu.edu
Today's computer systems face sophisticated attackers who combine multiple vulnerabilities
to penetrate networks with devastating impact. The overall security of a network cannot be …

A predictive framework for cyber security analytics using attack graphs

S Abraham, S Nair - arXiv preprint arXiv:1502.01240, 2015 - arxiv.org
Security metrics serve as a powerful tool for organizations to understand the effectiveness of
protecting computer networks. However majority of these measurement techniques don't …