A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

Network forensics: Review, taxonomy, and open challenges

S Khan, A Gani, AWA Wahab, M Shiraz… - Journal of Network and …, 2016 - Elsevier
In recent years, a number of network forensics techniques have been proposed to
investigate the increasing number of cybercrimes. Network forensics techniques assist in …

NetSecuritas: An integrated attack graph-based security assessment tool for enterprise networks

N Ghosh, I Chokshi, M Sarkar, SK Ghosh… - Proceedings of the 16th …, 2015 - dl.acm.org
Sophisticated cyber-attacks have become prominent with the growth of the Internet and web
technology. Such attacks are multi-stage ones, and correlate vulnerabilities on intermediate …

Attack graphs representations

MA Alhomidi, MJ Reed - 2012 4th Computer Science and …, 2012 - ieeexplore.ieee.org
Attack graphs have been widely used to represent and analyze security attacks. More
specifically, they show all ways of how an attacker violets a security policy. Most attack …

Analytical framework for measuring network security using exploit dependency graph

P Bhattacharya, SK Ghosh - IET Information Security, 2012 - IET
Attack graph is a popular tool for modelling multi-staged, correlated attacks on computer
networks. Attack graphs have been widely used for measuring network security risks …

It is Time To Steer: A Scalable Framework for Analysis-Driven Attack Graph Generation

A Palma, M Angelini - European Symposium on Research in Computer …, 2024 - Springer
Attack Graph (AG) represents the best-suited solution to support cyber risk assessment for
multi-step attacks on computer networks, although their generation suffers from poor …

Efficient generation of exploit dependency graph by customized attack modeling technique

I Chokshi, N Ghosh, SK Ghosh - 2012 18th International …, 2012 - ieeexplore.ieee.org
A major challenge in today's network is to maintain a secure interconnected world of
computing where confidentiality, integrity, availability of information and resources are …

A quantitative risk analysis model and simulation of enterprise networks

PB Lamichhane, L Hong… - 2018 IEEE 9th Annual …, 2018 - ieeexplore.ieee.org
In an enterprise network, an attacker can get access and privilege to the critical asset
through step by step vulnerabilities exploitation of network devices that lie between them …

[引用][C] 基于Challenge 策略的大规模恶意P2P 僵尸节点检测技术

李景, 姚一杨, 卢新岱, 乔勇 - 计算机工程, 2016