It is Time To Steer: A Scalable Framework for Analysis-Driven Attack Graph Generation
Abstract
References
Index Terms
- It is Time To Steer: A Scalable Framework for Analysis-Driven Attack Graph Generation
Recommendations
From attack graph analysis to attack function analysis
AbstractAttack graph analysis is a model-based network-security analysis method. It generates and analyzes a directed graph called an attack graph. Each node corresponds to a malicious event caused by attackers, and the edges correspond to the causal ...
Highlights- Proposing to use attack functions as the single source of various attack graphs.
- An attack function is a monotonic mapping between sets of propositions.
- It enables the consistent mixture of different forms of attack graphs.
- It ...
A planner-based approach to generate and analyze minimal attack graph
In the present scenario, even well administered networks are susceptible to sophisticated cyber attacks. Such attack combines vulnerabilities existing on different systems/services and are potentially more harmful than single point attacks. One of the ...
A vulnerability attack graph generation method based on scripts
ICICA'12: Proceedings of the Third international conference on Information Computing and ApplicationsThe vulnerability attack graph is an important method for prevention of network attacks. However, the huge amount of vulnerability has caused great difficulties for attack graph generation. By using the general search methods, we often retrieve many ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in