Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

MulVAL: A logic-based network security analyzer.

X Ou, S Govindavajhala, AW Appel - USENIX security symposium, 2005 - usenix.org
To determine the security impact software vulnerabilities have on a particular network, one
must consider interactions among multiple network elements. For a vulnerability analysis …

A scalable approach to attack graph generation

X Ou, WF Boyer, MA McQueen - … of the 13th ACM conference on …, 2006 - dl.acm.org
Attack graphs are important tools for analyzing security vulnerabilities in enterprise
networks. Previous work on attack graphs has not provided an account of the scalability of …

Practical attack graph generation for network defense

K Ingols, R Lippmann… - 2006 22nd Annual …, 2006 - ieeexplore.ieee.org
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use
to gain access to a targeted network. Defenders can then focus their efforts on patching the …

Topology discovery in software defined networks: Threats, taxonomy, and state-of-the-art

S Khan, A Gani, AWA Wahab… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
The fundamental role of the software defined networks (SDNs) is to decouple the data plane
from the control plane, thus providing a logically centralized visibility of the entire network to …

Using Bayesian networks for cyber security analysis

P Xie, JH Li, X Ou, P Liu, R Levy - 2010 IEEE/IFIP International …, 2010 - ieeexplore.ieee.org
Capturing the uncertain aspects in cyber security is important for security analysis in
enterprise networks. However, there has been insufficient effort in studying what modeling …

Assessing IoT enabled cyber-physical attack paths against critical systems

I Stellios, P Kotzanikolaou, C Grigoriadis - Computers & Security, 2021 - Elsevier
Abstract Internet of Things (IoT) increase the interconnectivity and interoperability of systems
in various critical sectors, such as industrial control, healthcare and smart transportation …

Big data analysis-based security situational awareness for smart grid

J Wu, K Ota, M Dong, J Li… - IEEE Transactions on Big …, 2016 - ieeexplore.ieee.org
Advanced communications and data processing technologies bring great benefits to the
smart grid. However, cyber-security threats also extend from the information system to the …