Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks

P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …

Evaluating the cybersecurity risk of real-world, machine learning production systems

R Bitton, N Maman, I Singh, S Momiyama… - ACM Computing …, 2023 - dl.acm.org
Although cyberattacks on machine learning (ML) production systems can be harmful, today,
security practitioners are ill-equipped, lacking methodologies and tactical tools that would …

[HTML][HTML] Modeling the development of energy network software, taking into account the detection and elimination of vulnerabilities

I Kotenko, K Izrailov, M Buinevich, I Saenko, R Shorey - Energies, 2023 - mdpi.com
This paper solves the problem of modeling the scheme for developing software systems,
which can be used in building solutions for secure energy networks. A development scheme …

Extending attack graphs to represent cyber-attacks in communication protocols and modern it networks

O Stan, R Bitton, M Ezrets, M Dadon… - … on Dependable and …, 2020 - ieeexplore.ieee.org
An attack graph is a method used to enumerate the possible paths that an attacker can take
in the organizational network. MulVAL is a known open-source framework used to …

Dynamic risk management response system to handle cyber threats

G Gonzalez-Granadillo, S Dubus, A Motzek… - Future Generation …, 2018 - Elsevier
Appropriate response strategies against new and ongoing cyber attacks must be able to
reduce risks down to acceptable levels, without sacrificing a mission for security. Existing …

[HTML][HTML] Cyber attacker profiling for risk analysis based on machine learning

I Kotenko, E Fedorchenko, E Novikova, A Jha - Sensors, 2023 - mdpi.com
The notion of the attacker profile is often used in risk analysis tasks such as cyber attack
forecasting, security incident investigations and security decision support. The attacker …

Heuristic approach for countermeasure selection using attack graphs

O Stan, R Bitton, M Ezrets, M Dadon… - 2021 IEEE 34th …, 2021 - ieeexplore.ieee.org
Selecting the optimal set of countermeasures to secure a network is a challenging task,
since it involves various considerations and trade-offs, such as prioritizing the risks to …

[HTML][HTML] Ensuring SDN Resilience under the Influence of Cyber Attacks: Combining Methods of Topological Transformation of Stochastic Networks, Markov Processes …

I Kotenko, I Saenko, A Privalov, O Lauta - Big Data and Cognitive …, 2023 - mdpi.com
The article proposes an approach to ensuring the functioning of Software-Defined Networks
(SDN) in cyber attack conditions based on the analytical modeling of cyber attacks using the …

Choosing models for security metrics visualization

M Kolomeec, G Gonzalez-Granadillo… - … Network Security: 7th …, 2017 - Springer
This paper aims at finding optimal visualization models for representation and analysis of
security related data, for example, security metrics, security incidents and cyber attack …

[HTML][HTML] Detection, control and mitigation system for secure vehicular communication

C Hidalgo, M Vaca, MP Nowak, P Frölich… - Vehicular …, 2022 - Elsevier
The increase in the safety and privacy of automated vehicle drivers against hazardous cyber-
attacks will lead to a considerable reduction in the number of global deaths and injuries. In …