7,763 Hits in 6.7 sec

A Novel Model for Vulnerability Analysis through Enhanced Directed Graphs and Quantitative Metrics [article]

Ángel Longueira-Romero, Rosa Iglesias, Jose Luis Flores, Iñaki Garitano
2021 arXiv   pre-print
The proposed model is based on two main elements: a directed graph representation of the internal structure of the component, and a set of quantitative metrics that are based on international security  ...  This model is applied throughout the entire lifespan of a device to track vulnerabilities, identify new requirements, root causes, and test cases.  ...  The proposed model is built on top of a directed graph-based structure, and a set of metrics based on globally accepted security standards.  ... 
arXiv:2112.06453v1 fatcat:uurz7rg3bfft5cxmb6qzivlj4e

A Novel Model for Vulnerability Analysis through Enhanced Directed Graphs and Quantitative Metrics

Ángel Longueira-Romero, Rosa Iglesias, Jose Luis Flores, Iñaki Garitano
2022 Sensors  
The proposed Extended Dependency Graph (EDG) model is based on two main elements: a directed graph representation of the internal structure of the component, and a set of quantitative metrics based on  ...  The model was able to determine new requirements and generate test cases from the analysis.  ...  The model is built on a directed graph-based structure and a set of metrics based on globally accepted security standards.  ... 
doi:10.3390/s22062126 pmid:35336299 pmcid:PMC8952879 fatcat:gzxo74kfp5cjroqcizjhfgdtfm

Cyber Attack Exposure Evaluation Framework for the Smart Grid

Adam Hahn, Manimaran Govindarasu
2011 IEEE Transactions on Smart Grid  
The resulting model is used to produce a quantitative information-based exposure metric to evaluate the completeness of implemented security mechanisms.  ...  The aforementioned concerns produce a requirement for increased risk management including security models that have the capability to scale to such a complex environment.  ...  This research provides a novel network security model tailored to provide a quantitative exposure metric based on these information objects by identifying and analyzing their dependency on security mechanisms  ... 
doi:10.1109/tsg.2011.2163829 fatcat:a3ciprn6yjejnhrk5x55xfzlty

ICARFAD: A Novel Framework for Improved Network Security Situation Awareness

Chanchal Sharma, Vandana Kate
2014 International Journal of Computer Applications  
This unexpected and frequent changes in the system is measured which gives a direction of vulnerable behaviour and the criticality of affecting the process.  ...  Accessing this information through actual network conditions and changes for improving the security is comes under the area of situational awareness system.  ...  Suresh Jain for discussion regarding the intrusion systems & for producing the approach adapted for this paper.  ... 
doi:10.5120/15461-4064 fatcat:foxawich4bernflmhqhsorip7m

Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System

M.A. McQueen, W.F. Boyer, M.A. Flynn, G.A. Beitel
2006 Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)  
The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-tocompromise for differing  ...  Timeto-compromise is modeled as a function of known vulnerabilities and attacker skill level.  ...  Alternative simplistic risk reduction models/metrics Consider some simplistic alternative quantitative risk reduction models/metrics.  ... 
doi:10.1109/hicss.2006.405 dblp:conf/hicss/McQueenBFB06 fatcat:qa7as7oylnabrajrvvfavx6hxi

A hybrid ranking approach to estimate vulnerability for dynamic attacks

Feng Zhao, Heqing Huang, Hai Jin, Qin Zhang
2011 Computers and Mathematics with Applications  
Moreover, a novel quantitative model, an adapted attack graph, is also proposed to escaping isolated scoring, which takes the dynamic and logic relations among exploits into account, and significantly  ...  To enhance security in dynamic networks, it is important to evaluate the vulnerabilities and offer economic and practical patching strategy since vulnerability is the major driving force for attacks.  ...  Many techniques for quantitative security analysis and attacking strategy modeling are presented.  ... 
doi:10.1016/j.camwa.2011.09.031 fatcat:xbgrbcld3vanrj47y3ix3rsjmi

Security Assessment Rating Framework for Enterprises using MITRE ATT CK Matrix [article]

Hardik Manocha, Akash Srivastava, Chetan Verma, Ratan Gupta, Bhavya Bansal
2021 arXiv   pre-print
Using this paper, we aim to provide a holistic and precise security analysis rating framework for organizations that increases the overall coherency of the outcomes of such testing.  ...  Threats targeting cyberspace are becoming more prominent and intelligent day by day. This inherently leads to a dire demand for continuous security validation and testing.  ...  open source for further enhancement, and available as a node NPM package for direct integration into other web platforms.  ... 
arXiv:2108.06559v1 fatcat:o5nlqxbuava3bcho4lrisvfcoa

Security Assessment of Computer Networks Based on Attack Graphs and Security Events [chapter]

Igor Kotenko, Elena Doynikova
2014 Lecture Notes in Computer Science  
It is based on the security metrics taxonomy and different techniques for calculation of security metrics according to the data about current events.  ...  Proposed metrics form the basis for security awareness and reflect current security situation, including development of attacks, attacks sources and targets, attackers' characteristics.  ...  This research is being supported by grants of the Russian Foundation of Basic Research (13-01-00843, 13-07-13159, 14-07-00697, 14-07-00417) and the Program of fundamental research of the Department for  ... 
doi:10.1007/978-3-642-55032-4_47 fatcat:li7hc5oxzfbhzasg3rn6svkism

Measuring Network Security Using Bayesian Network-Based Attack Graphs

Marcel Frigault, Lingyu Wang
2008 2008 32nd Annual IEEE International Computer Software and Applications Conference  
implement the BN-based models, support the analysis of these models and provide a practical tool for computing network security metrics.  ...  as follows: A novel Bayesian Network-based attack graph model is proposed to combine CVSS scores for individual vulnerabilities into a single score for the whole network in a static environment.  ... 
doi:10.1109/compsac.2008.88 dblp:conf/compsac/FrigaultW08 fatcat:u6y7zcrje5at7cxefn5jcz72dm

Use of Attack Graphs in Security Systems

Vivek Shandilya, Chris B. Simmons, Sajjan Shiva
2014 Journal of Computer Networks and Communications  
Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits.  ...  One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies.  ...  [17] proposed a model to aggregate vulnerability metrics in an enterprise network to produce quantitative metrics measuring the probability an attack occurs in a given network.  ... 
doi:10.1155/2014/818957 fatcat:3tumnhfkefel3izxtzbhm2izeu

Unknown Vulnerability Risk Assessment Based on Directed Graph Models: A Survey

Wenhao He, Hongjiao Li, Jinguo Li
2019 IEEE Access  
Meantime, security metrics for unknown vulnerability risk assessment based on directed graph models are summarized and classified.  ...  INDEX TERMS Directed graph model, risk assessment, security metric, unknown vulnerability.  ...  Vulnerability risk assessment based on directed graph models needs to accomplish both qualitative and quantitative tasks.  ... 
doi:10.1109/access.2019.2954092 fatcat:cg3wdqldxzcuffjmkdkxxo5yta

An Attack Simulation and Evidence Chains Generation Model for Critical Information Infrastructures

Eleni-Maria Kalogeraki, Spyridon Papastergiou, Themis Panayiotopoulos
2022 Electronics  
Several research papers address vulnerability chain discovery techniques. Nevertheless, most of them do not focus on developing attack graphs based on incident analysis.  ...  They compromise interconnected Critical Information Infrastructures (CIIs) (e.g., Supervisory Control and Data Acquisition (SCADA) systems) by exploiting a series of vulnerabilities and launching multiple  ...  In case a large network analysis is either an explicit or strict requirement, a quantitative, much more complex analysis is preferred, which can be achieved through probabilistic models [16] .  ... 
doi:10.3390/electronics11030404 fatcat:fs4o3ruzezg5npw5ijmy2uucci

DeepWeave: Accelerating Job Completion Time with Deep Reinforcement Learning-based Coflow Scheduling

Penghao Sun, Zehua Guo, Junchao Wang, Junfei Li, Julong Lan, Yuxiang Hu
2020 Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence  
A job consists of multiple coflows and can be usually formulated as a Directed-Acyclic Graph (DAG).  ...  knowledge or a pre-assumed model.  ...  mechanism, (2) a graph normalization phase inspired by k-partite graph, and (3) novel message propagation networks for vulnerability modeling and detection.  ... 
doi:10.24963/ijcai.2020/454 dblp:conf/ijcai/ZhuangLQLWH20 fatcat:olbzdcm2mvd43ic2dfryqnnzii

Integrated Clinical Environment Security Analysis Using Reinforcement Learning

Mariam Ibrahim, Ruba Elhafiz
2022 Bioengineering  
Numeric values will be assigned to the attack graph to better determine the most vulnerable part of the system and suggest this analysis to be further utilized for bigger graphs.  ...  Therefore, this paper presents a Q-learning-based attack graph analysis approach in which an attack graph that is generated for the Integrated Clinical Environment system resembles the environment, and  ...  Different approaches for security analysis, such as qualitative and quantitative risk analysis, can be employed at the design stage.  ... 
doi:10.3390/bioengineering9060253 pmid:35735496 pmcid:PMC9220416 fatcat:npryg6zzyvdnjf2iomnqjylnva

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

Barbara Kordy, Ludovic Piètre-Cambacédès, Patrick Schweitzer
2014 Computer Science Review  
The great advantage of graph-based approaches lies in combining user friendly, intuitive, visual features with formal semantics and algorithms that allow for qualitative and quantitative analysis.  ...  This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs).  ...  A rigorous mathematical framework is provided for quantitative analysis of ACTs in [247] and [248] .  ... 
doi:10.1016/j.cosrev.2014.07.001 fatcat:aie7uxdorjclnb5ctgg5nrczqi
« Previous Showing results 1 — 15 out of 7,763 results