[PDF][PDF] 基于攻防博弈模型的网络安全测评和最优主动防御

姜伟, 方滨兴, 田志宏, 张宏莉 - 计算机学报, 2009 - cjc.ict.ac.cn
摘要为了进行网络信息系统安全测评和主动防御, 提出了网络防御图模型,
攻防策略分类及其成本量化方法, 网络攻防博弈模型和基于上述模型的最优主动防御选取算法 …

Scalable, graph-based network vulnerability analysis

P Ammann, D Wijesekera, S Kaushik - … of the 9th ACM Conference on …, 2002 - dl.acm.org
Even well administered networks are vulnerable to attack. Recent work in network security
has focused on the fact that combinations of exploits are the typical means by which an …

[图书][B] Scenario graphs and attack graphs

OM Sheyner - 2004 - search.proquest.com
We develop formal techniques that give users flexibility in examining design errors
discovered by automated analysis. We build our results using the model checking approach …

A host-based approach to network attack chaining analysis

P Ammann, J Pamula, R Ritchey… - 21st Annual Computer …, 2005 - ieeexplore.ieee.org
The typical means by which an attacker breaks into a network is through a chain of exploits,
where each exploit in the chain lays the groundwork for subsequent exploits. Such a chain is …

Model-based analysis of configuration vulnerabilities

CR Ramakrishnan, R Sekar - Journal of Computer Security, 2002 - content.iospress.com
Model-based analysis of configuration vulnerabilities1 Page 1 Journal of Computer Security
10 (2002) 189–209 189 IOS Press Model-based analysis of configuration vulnerabilities1 CR …

A graph based approach toward network forensics analysis

W Wang, TE Daniels - ACM Transactions on Information and System …, 2008 - dl.acm.org
In this article we develop a novel graph-based approach toward network forensics analysis.
Central to our approach is the evidence graph model that facilitates evidence presentation …

A specification-based coverage metric to evaluate test sets

PE Ammann, PE Black - … Journal of Reliability, Quality and Safety …, 2001 - World Scientific
Software developers use a variety of formal and informal methods, including testing, to
argue that their systems are suitable for building high assurance applications. In this paper …

Assets focus risk management framework for critical infrastructure cybersecurity risk management

HI Kure, S Islam - IET Cyber‐Physical Systems: Theory & …, 2019 - Wiley Online Library
Critical infrastructure (CI) is vital for the overall economic growth and its reliable and safe
operation is essential for a nation's stability and people's safety. Proper operation of the …

Automated discovery of mimicry attacks

JT Giffin, S Jha, BP Miller - Recent Advances in Intrusion Detection: 9th …, 2006 - Springer
Abstract Model-based anomaly detection systems restrict program execution by a
predefined model of allowed system call sequences. These systems are useful only if they …

A self-stabilizing minimal dominating set algorithm with safe convergence

H Kakugawa, T Masuzawa - Proceedings 20th IEEE …, 2006 - ieeexplore.ieee.org
A self-stabilizing distributed system is a fault-tolerant distributed system that tolerates any
kind and any finite number of transient faults, such as message loss and memory corruption …