A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

Automated generation and analysis of attack graphs

O Sheyner, J Haines, S Jha… - … IEEE Symposium on …, 2002 - ieeexplore.ieee.org
An integral part of modeling the global view of network security is constructing attack graphs.
Manual attack graph construction is tedious, error-prone, and impractical for attack graphs …

[PDF][PDF] 基于攻防博弈模型的网络安全测评和最优主动防御

姜伟, 方滨兴, 田志宏, 张宏莉 - 计算机学报, 2009 - cjc.ict.ac.cn
摘要为了进行网络信息系统安全测评和主动防御, 提出了网络防御图模型,
攻防策略分类及其成本量化方法, 网络攻防博弈模型和基于上述模型的最优主动防御选取算法 …

Two formal analyses of attack graphs

S Jha, O Sheyner, J Wing - Proceedings 15th IEEE Computer …, 2002 - ieeexplore.ieee.org
An attack graph is a succinct representation of all paths through a system that end in a state
where an intruder has successfully achieved his goal. Today Red Teams determine the …

An attack graph-based probabilistic security metric

L Wang, T Islam, T Long, A Singhal… - Data and Applications …, 2008 - Springer
To protect critical resources in today's networked environments, it is desirable to quantify the
likelihood of potential multi-step attacks that combine multiple vulnerabilities. This now …

Experimenting with quantitative evaluation tools for monitoring operational security

R Ortalo, Y Deswarte… - IEEE Transactions on …, 1999 - ieeexplore.ieee.org
This paper presents the results of an experiment in security evaluation. The system is
modeled as a privilege graph that exhibits its security vulnerabilities. Quantitative measures …

k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities

L Wang, S Jajodia, A Singhal… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
By enabling a direct comparison of different security solutions with respect to their relative
effectiveness, a network security metric may provide quantifiable evidences to assist security …

Tools for generating and analyzing attack graphs

O Sheyner, J Wing - International symposium on formal methods for …, 2003 - Springer
Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a
desired state. System administrators use attack graphs to determine how vulnerable their …

Global intrusion detection in the domino overlay system

V Yegneswaran, P Barford, S Jha - 2003 - minds.wisconsin.edu
Sharing data between widely distributed intrusion detection systems offers the possibility of
significant improvements in speed and accuracy over systems operating in isolation. In this …