A taxonomy for attack graph generation and usage in network security

K Kaynar - Journal of Information Security and Applications, 2016 - Elsevier
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …

Cost-aware securing of IoT systems using attack graphs

B Yiğit, G Gür, F Alagöz, B Tellenbach - Ad Hoc Networks, 2019 - Elsevier
Abstract The Internet of Things (IoT) contains a diverse set of sensors, actuators and other
Internet-connected devices communicating, processing data and performing a multitude of …

Diversifying network services under cost constraints for better resilience against unknown attacks

D Borbor, L Wang, S Jajodia, A Singhal - … XXX: 30th Annual IFIP WG 11.3 …, 2016 - Springer
Diversity as a security mechanism has received revived interest recently due to its potential
for improving the resilience of software and networks against unknown attacks. Recent work …

Securing networks against unpatchable and unknown vulnerabilities using heterogeneous hardening options

D Borbor, L Wang, S Jajodia, A Singhal - … XXXI: 31st Annual IFIP WG 11.3 …, 2017 - Springer
The administrators of a mission critical network usually have to worry about non-traditional
threats, eg, how to live with known, but unpatchable vulnerabilities, and how to improve the …

Surviving unpatchable vulnerabilities through heterogeneous network hardening options

D Borbor, L Wang, S Jajodia… - Journal of Computer …, 2018 - content.iospress.com
The administrators of a mission critical network usually have to worry about non-traditional
threats, eg, how to live with known, but unpatchable vulnerabilities, and how to improve the …

Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization

X Gao, Y Zhou, L Xu, D Zhao - Entropy, 2022 - mdpi.com
With the rapid development of Industrial Internet of Things technology, the industrial control
system (ICS) faces more and more security threats, which may lead to serious risks and …

Optimal response to computer network threats

F Abazari, A Madani, H Gharaee - 2016 8th International …, 2016 - ieeexplore.ieee.org
Mitigating security threats is a big challenge for network administrator, because threats can
be exploited by attackers and lead to a cyber-attack. Therefore, network administrator should …

Diversity-aware, cost-effective network security hardening using attack graph

MA Jabbar, GS Bopche, BL Deekshatulu… - Security in Computing …, 2017 - Springer
To assess the security risk of a given computer network, it is imperative to understand how
individual vulnerabilities can be combined to launch a multistage, multi-host Cyber attack …

[PDF][PDF] Distributed log analysis for scenario-based detection of multi-step attacks and generation of near-optimal defense recommendations

K Kaynar - 2017 - depositonce.tu-berlin.de
Detecting related, ongoing actions of attackers is significant for providing a complete
situational assessment of security and determining the most effective reactive defense …

[引用][C] 基于贝叶斯攻击图的最优安全防护策略选择模型

高妮, 高岭, 贺毅岳, 王帆 - 计算机工程与应用, 2016