A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception

HS Lallie, K Debattista, J Bal - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Perceiving and understanding cyber-attacks can be a difficult task. This problem is widely
recognized and welldocumented, and more effective techniques are needed to aid cyber …

[PDF][PDF] Attack graph generation and analysis techniques

MS Barik, A Sengupta, C Mazumdar - Defence science journal, 2016 - core.ac.uk
As computer networks are emerging in everyday life, network security has become an
important issue. Simultaneously, attacks are becoming more sophisticated, making the …

Use of attack graphs in security systems

V Shandilya, CB Simmons… - Journal of Computer …, 2014 - Wiley Online Library
Attack graphs have been used to model the vulnerabilities of the systems and their potential
exploits. The successful exploits leading to the partial/total failure of the systems are subject …

GARNET: A graphical attack graph and reachability network evaluation tool

L Williams, R Lippmann, K Ingols - Visualization for Computer Security: 5th …, 2008 - Springer
Attack graphs enable computation of important network security metrics by revealing
potential attack paths an adversary could use to gain control of network assets. This paper …

Identifying critical attack assets in dependency attack graphs

RE Sawilla, X Ou - Computer Security-ESORICS 2008: 13th European …, 2008 - Springer
Attack graphs have been proposed as useful tools for analyzing security vulnerabilities in
network systems. Even when they are produced efficiently, the size and complexity of attack …

Improving attack graph visualization through data reduction and attack grouping

J Homer, A Varikuti, X Ou, MA McQueen - Visualization for Computer …, 2008 - Springer
Various tools exist to analyze enterprise network systems and to produce attack graphs
detailing how attackers might penetrate into the system. These attack graphs, however, are …

An interactive attack graph cascade and reachability display

L Williams, R Lippmann, K Ingols - … 2007: Proceedings of the Workshop on …, 2008 - Springer
Attack graphs for large enterprise networks improve security by revealing critical paths used
by adversaries to capture network assets. Even with simplification, current attack graph …

Attack–defense trees

B Kordy, S Mauw, S Radomirović… - Journal of Logic and …, 2014 - academic.oup.com
Attack–defense trees are a novel methodology for graphical security modelling and
assessment. They extend the well-known formalism of attack trees by allowing nodes that …

A taxonomy for attack graph generation and usage in network security

K Kaynar - Journal of Information Security and Applications, 2016 - Elsevier
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …