A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

Model-based quantitative network security metrics: A survey

A Ramos, M Lazar, R Holanda Filho… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Network security metrics (NSMs) based on models allow to quantitatively evaluate the
overall resilience of networked systems against attacks. For that reason, such metrics are of …

Practical attack graph generation for network defense

K Ingols, R Lippmann… - 2006 22nd Annual …, 2006 - ieeexplore.ieee.org
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use
to gain access to a targeted network. Defenders can then focus their efforts on patching the …

Using Bayesian networks for cyber security analysis

P Xie, JH Li, X Ou, P Liu, R Levy - 2010 IEEE/IFIP International …, 2010 - ieeexplore.ieee.org
Capturing the uncertain aspects in cyber security is important for security analysis in
enterprise networks. However, there has been insufficient effort in studying what modeling …

Modeling modern network attacks and countermeasures using attack graphs

K Ingols, M Chu, R Lippmann… - 2009 Annual …, 2009 - ieeexplore.ieee.org
By accurately measuring risk for enterprise networks, attack graphs allow network defenders
to understand the most critical threats and select the most effective countermeasures. This …

Information security strategies: towards an organizational multi-strategy perspective

A Ahmad, SB Maynard, S Park - Journal of Intelligent Manufacturing, 2014 - Springer
There considerable advice in both research and practice oriented literature on the topic of
information security. Most of the discussion in literature focuses on how to prevent security …

k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities

L Wang, S Jajodia, A Singhal… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
By enabling a direct comparison of different security solutions with respect to their relative
effectiveness, a network security metric may provide quantifiable evidences to assist security …

Information technology security assessment system

SW Boyer, N Venna, M Ando - US Patent 10,805,331, 2020 - Google Patents
A method and system for creating a composite security rating from security characterization
data of a third party computer system. The security characterization data is derived from …

[图书][B] Security risk analysis of enterprise networks using probabilistic attack graphs

L Wang, S Jajodia, A Singhal, A Singhal, X Ou - 2017 - Springer
Today's information systems face sophisticated attackers who combine multiple
vulnerabilities to penetrate networks with devastating impact. The overall security of an …

The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures

T Sommestad, M Ekstedt, H Holm - IEEE Systems Journal, 2012 - ieeexplore.ieee.org
The cyber security modeling language (CySeMoL) is a modeling language for enterprise-
level system architectures coupled to a probabilistic inference engine. If the computer …