DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

Model-based quantitative network security metrics: A survey

A Ramos, M Lazar, R Holanda Filho… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Network security metrics (NSMs) based on models allow to quantitatively evaluate the
overall resilience of networked systems against attacks. For that reason, such metrics are of …

Domain adaptation for object recognition: An unsupervised approach

R Gopalan, R Li, R Chellappa - 2011 international conference …, 2011 - ieeexplore.ieee.org
Adapting the classifier trained on a source domain to recognize instances from a new target
domain is an important problem that is receiving recent attention. In this paper, we present …

A scalable approach to attack graph generation

X Ou, WF Boyer, MA McQueen - … of the 13th ACM conference on …, 2006 - dl.acm.org
Attack graphs are important tools for analyzing security vulnerabilities in enterprise
networks. Previous work on attack graphs has not provided an account of the scalability of …

Learning the associations of mitre att & ck adversarial techniques

R Al-Shaer, JM Spring… - 2020 IEEE Conference on …, 2020 - ieeexplore.ieee.org
The MITRE ATT&CK Framework provides a rich and actionable repository of adversarial
tactics, techniques, and procedures (TTP). However, this information would be highly useful …

Practical attack graph generation for network defense

K Ingols, R Lippmann… - 2006 22nd Annual …, 2006 - ieeexplore.ieee.org
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use
to gain access to a targeted network. Defenders can then focus their efforts on patching the …

[PDF][PDF] The diamond model of intrusion analysis

S Caltagirone, A Pendergast, C Betz - Threat Connect, 2013 - threatintel.academy
This paper presents a novel model of intrusion analysis built by analysts, derived from years
of experience, asking the simple question,“What is the underlying method to our work?” The …

Modeling modern network attacks and countermeasures using attack graphs

K Ingols, M Chu, R Lippmann… - 2009 Annual …, 2009 - ieeexplore.ieee.org
By accurately measuring risk for enterprise networks, attack graphs allow network defenders
to understand the most critical threats and select the most effective countermeasures. This …

Assessing the effectiveness of moving target defenses using security models

JB Hong, DS Kim - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
Cyber crime is a developing concern, where criminals are targeting valuable assets and
critical infrastructures within networked systems, causing a severe socio-economic impact …

CyGraph: graph-based analytics and visualization for cybersecurity

S Noel, E Harley, KH Tam, M Limiero, M Share - Handbook of statistics, 2016 - Elsevier
This chapter describes CyGraph, a system for improving network security posture,
maintaining situational awareness in the face of cyberattacks, and focusing on protection of …