[PDF][PDF] An annotated review of past papers on attack graphs

RP Lippmann, KW Ingols - 2005 - Citeseer
This report reviews past research papers that describe how to construct attack graphs, how
to use them to improve security of computer networks, and how to use them to analyze alerts …

Practical attack graph generation for network defense

K Ingols, R Lippmann… - 2006 22nd Annual …, 2006 - ieeexplore.ieee.org
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use
to gain access to a targeted network. Defenders can then focus their efforts on patching the …

Penetration testing== POMDP solving?

C Sarraute, O Buffet, J Hoffmann - arXiv preprint arXiv:1306.4714, 2013 - arxiv.org
Penetration Testing is a methodology for assessing network security, by generating and
executing possible attacks. Doing so automatically allows for regular and systematic testing …

Rheostat: Real-time risk management

A Gehani, G Kedem - Recent Advances in Intrusion Detection: 7th …, 2004 - Springer
As the frequency of attacks faced by the average host connected to the Internet increases,
reliance on manual intervention for response is decreasingly tenable. Operating system and …

[PDF][PDF] Attack graph-based risk assessment and optimisation approach

M Alhomidi, M Reed - International Journal of Network Security & Its …, 2014 - Citeseer
Attack graphs are models that offer significant capabilities to analyse security in network
systems. An attack graph allows the representation of vulnerabilities, exploits and conditions …

Risk assessment and analysis through population-based attack graph modelling

M Alhomidi, M Reed - World Congress on Internet Security …, 2013 - ieeexplore.ieee.org
Attack graphs are models that offer significant capabilities to analyse security in network
systems because they can represent vulnerabilities, exploits and conditions for each attack …

Automated attack planning

C Sarraute - arXiv preprint arXiv:1307.7808, 2013 - arxiv.org
Penetration Testing is a methodology for assessing network security, by generating and
executing possible attacks. Doing so automatically allows for regular and systematic testing …

Analytical models for risk-based intrusion response

B Caskurlu, A Gehani, CC Bilgin, K Subramani - Computer Networks, 2013 - Elsevier
Risk analysis has been used to manage the security of systems for several decades.
However, its use has been limited to offline risk computation and manual response. In …

A new approach for network vulnerability analysis

HL Vu, KK Khaw, TY Chen - The Computer Journal, 2015 - academic.oup.com
Despite a significant increase in security of modern information systems, cyber attacks have
become more sophisticated as attackers combine multiple vulnerabilities to penetrate …

Optimal adversary behavior for the serial model of financial attack trees

M Niitsoo - International Workshop on Security, 2010 - Springer
Attack tree analysis is used to estimate different parameters of general security threats
based on information available for atomic subthreats. We focus on estimating the expected …