A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities

A Alshamrani, S Myneni, A Chowdhary… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Threats that have been primarily targeting nation states and their associated entities have
expanded the target zone to include the private and corporate sectors. This class of threats …

A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

A survey of moving target defenses for network security

S Sengupta, A Chowdhary, A Sabur… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …

Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures

A Sharma, BB Gupta, AK Singh… - Journal of Ambient …, 2023 - Springer
In today's cyber warfare realm, every stakeholder in cyberspace is becoming more potent by
developing advanced cyber weapons. They have equipped with the most advanced …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

[图书][B] Data analytics for cybersecurity

VP Janeja - 2022 - books.google.com
As the world becomes increasingly connected, it is also more exposed to a myriad of cyber
threats. We need to use multiple types of tools and techniques to learn and understand the …

A framework for automating security analysis of the internet of things

M Ge, JB Hong, W Guttmann, DS Kim - Journal of Network and Computer …, 2017 - Elsevier
Abstract The Internet of Things (IoT) is enabling innovative applications in various domains.
Due to its heterogeneous and wide-scale structure, it introduces many new security issues …

[PDF][PDF] The diamond model of intrusion analysis

S Caltagirone, A Pendergast, C Betz - Threat Connect, 2013 - threatintel.academy
This paper presents a novel model of intrusion analysis built by analysts, derived from years
of experience, asking the simple question,“What is the underlying method to our work?” The …

Using Bayesian networks for cyber security analysis

P Xie, JH Li, X Ou, P Liu, R Levy - 2010 IEEE/IFIP International …, 2010 - ieeexplore.ieee.org
Capturing the uncertain aspects in cyber security is important for security analysis in
enterprise networks. However, there has been insufficient effort in studying what modeling …

Modeling modern network attacks and countermeasures using attack graphs

K Ingols, M Chu, R Lippmann… - 2009 Annual …, 2009 - ieeexplore.ieee.org
By accurately measuring risk for enterprise networks, attack graphs allow network defenders
to understand the most critical threats and select the most effective countermeasures. This …