Filters








143,787 Hits in 4.0 sec

An Improved Model for Analysis of Host Network Vulnerability

Ramchandra Yadav, Raghu Nath, Anil Kumar
<span title="2016-08-16">2016</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
An attacker tries to exploit the least secure system by small attacks iteratively, where each exploit in the network provide the platform for subsequent exploit.  ...  Such a series is known as attack path and the set of all possible paths will form an attack graph. By their highly interdependencies, it is much complex to draw traditional vulnerability analysis.  ...  Figure 4 :Figure 5 : 45 Architecture of Attack Graph generation Algorithm for attack graph generator process Figure 6 : 6 Proposed Architecture for a Network Vulnerability Analysis  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016911216">doi:10.5120/ijca2016911216</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4chi74tfurhqjbmpylpsd47s3y">fatcat:4chi74tfurhqjbmpylpsd47s3y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602143548/https://www.ijcaonline.org/archives/volume148/number13/yadav-2016-ijca-911216.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f1/86/f1869a971e66a31073312d6d26c772c1c68db0fc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016911216"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Combinatorial analysis of network security

Steven E. Noel, Brian O'Berry, Charles Hutchinson, Sushil Jajodia, Lynn M. Keuthan, Andy Nguyen, Harold H. Szu, James R. Buss
<span title="2002-03-12">2002</span> <i title="SPIE"> Wavelet and Independent Component Analysis Applications IX </i> &nbsp;
We extend the traditional analysis of network vulnerability by searching for sequences of exploited vulnerabilities distributed throughout a network.  ...  We also perform a scaling experiment to show the performance of our approach for larger networks.  ...  For vulnerability analysis, the system to be tested is a model of the network security attributes and their relationships.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1117/12.458763">doi:10.1117/12.458763</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bjq3mlbttjfa3gp6lrriruyi4y">fatcat:bjq3mlbttjfa3gp6lrriruyi4y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810203455/http://ist.gmu.edu/~csis/noel/pubs/2002_AeroSense.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f2/c6/f2c6f78f0c4905131aacea260c34ac6dc075d655.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1117/12.458763"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Scalable, Vulnerability Modeling and Correlating Method for Network Security [chapter]

Xuejiao Liu, Debao Xiao, Nian Ma, Jie Yu
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jajl7qtqc5cy7oavratsldrv2y" style="color: black;">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</a> </i> &nbsp;
Recent works in network security have demostrated the fact that combinations of vulnerability exploits are the typical means by which an attacker can break into a network.  ...  In this paper, we propose an analysis model, which derives vulnerability analysis functionality from the interaction of three distinct processes: scanning, modeling and correlating.  ...  Existing analysis models have the problems of inadequate capacity of quantitative analysis and lacking for vulnerabilities correlation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-10485-5_16">doi:10.1007/978-3-642-10485-5_16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pg4vo5xcr5dlze3ros7knek2qq">fatcat:pg4vo5xcr5dlze3ros7knek2qq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200709131825/https://eudl.eu/pdf/10.1007/978-3-642-10485-5_16" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/24/c8/24c89ede7a04f6091ddb1b1cabb2507e11277ee9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-10485-5_16"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Advances in Topological Vulnerability Analysis

Steven Noel, Matthew Elder, Sushil Jajodia, Pramod Kalapa, Scott O'Hare, Kenneth Prole
<span title="">2009</span> <i title="IEEE"> 2009 Cybersecurity Applications &amp; Technology Conference for Homeland Security </i> &nbsp;
From models of the network vulnerabilities and potential attacker exploits, we discover attack paths (organized as graphs) that convey the impact of individual and combined vulnerabilities on overall security  ...  The organization of networks and the interdependencies of vulnerabilities are so complex as to make traditional vulnerability analysis inadequate.  ...  It has been suggested [19] [20] that worst-case complexity for this kind of attack graph analysis is O(n 4 ) or even O(n 6 ), for n hosts in the network model.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/catch.2009.19">doi:10.1109/catch.2009.19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/55zoqgjmmvffzasat3rlw3ivla">fatcat:55zoqgjmmvffzasat3rlw3ivla</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120731052320/http://proinfomd.com/2009_catch.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b3/92/b392dd65130f857929e0ffe5971aee147a70b6bd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/catch.2009.19"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Fast Network Attack Modeling and Security Evaluation based on Attack Graphs

Igor Kotenko, Andrey Chechulin
<span title="">2014</span> <i title="River Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7fvtrv6o65gszpj46refzq3jw4" style="color: black;">Journal of Cyber Security and Mobility</a> </i> &nbsp;
The novelty of the proposed approach is the use of special algorithms for construction, modification and analysis of attack graphs aimed at rapid security evaluation.  ...  It is based on modeling of computer network and malefactors' behaviors, building attack graphs, processing current alerts for real-time adjusting of particular attack graphs, calculating different security  ...  Department for Nanotechnologies and Informational Technologies of the Russian Academy of Sciences (contract #2.2), and the project ENGENSEC of the TEMPUS program of the European Community.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13052/jcsm2245-1439.312">doi:10.13052/jcsm2245-1439.312</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5rjjqpqapvhnzpidynjlmigq4i">fatcat:5rjjqpqapvhnzpidynjlmigq4i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722123217/https://www.riverpublishers.com/journal/journal_articles/RP_Journal_2245-1439_312.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fe/aa/feaa67ccd973997a4357a8fd17ef0d7b424cdec9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13052/jcsm2245-1439.312"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Topological analysis of network attack vulnerability

Sushil Jajodia
<span title="">2006</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zb4rq5sfzzczvgii5ae2373dhq" style="color: black;">Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Services - PST &#39;06</a> </i> &nbsp;
The TVA tool includes modeling of network security conditions and attack techniques (exploits), automatic population of models via the Nessus vulnerability scanner, and analysis of exploit sequences (attack  ...  It is ideal for inexpensive what-if analyses of the impact of various network configurations on overall network security.  ...  ACKNOWLEDGEMENTS We gratefully acknowledge the software development efforts of Michael Jacobs in support of this chapter.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1501434.1501437">doi:10.1145/1501434.1501437</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/pst/Jajodia06.html">dblp:conf/pst/Jajodia06</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3xk6eikaendofjprkfm5gnczfm">fatcat:3xk6eikaendofjprkfm5gnczfm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060902150354/http://ise.gmu.edu/~snoel/pubs/TVA_chapter.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/04/e2/04e204c73af8258373ef4e9183ec733ea844a45d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1501434.1501437"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Topological analysis of network attack vulnerability

Sushil Jajodia
<span title="">2007</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS &#39;07</a> </i> &nbsp;
The TVA tool includes modeling of network security conditions and attack techniques (exploits), automatic population of models via the Nessus vulnerability scanner, and analysis of exploit sequences (attack  ...  It is ideal for inexpensive what-if analyses of the impact of various network configurations on overall network security.  ...  In the context of network security, our assumption of monotonicity is quite reasonable.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1229285.1229288">doi:10.1145/1229285.1229288</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/Jajodia07.html">dblp:conf/ccs/Jajodia07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/b4jz5yci7newdlzxjis5xiwaku">fatcat:b4jz5yci7newdlzxjis5xiwaku</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060902150354/http://ise.gmu.edu/~snoel/pubs/TVA_chapter.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/04/e2/04e204c73af8258373ef4e9183ec733ea844a45d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1229285.1229288"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing

Jianping Zeng, Shuang Wu, Yanyu Chen, Rui Zeng, Chengrong Wu
<span title="2019-12-26">2019</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a> </i> &nbsp;
By using the attack graph, the administrator can evaluate the security of the network and analyze and predict the behavior of the attacker.  ...  Although there are many research studies on attack graph, there is no systematic survey for the related analysis methods.  ...  All these tasks need rigorous modeling analysis. For attack path prediction, since the network attack is usually systemic, the exploited vulnerability and the attack path can be traceable.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2019/2031063">doi:10.1155/2019/2031063</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/z2xsqdwwzvbjdatv4x4u3t2ega">fatcat:z2xsqdwwzvbjdatv4x4u3t2ega</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191228005653/http://downloads.hindawi.com/journals/scn/2019/2031063.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4d/ac/4dace80978c3e3360f1168f66edcfb582f33cd5b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2019/2031063"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Topological Vulnerability Analysis [chapter]

Sushil Jajodia, Steven Noel
<span title="2009-09-30">2009</span> <i title="Springer US"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zmddx3pofreuri5ozrik742edy" style="color: black;">Advances in Information Security</a> </i> &nbsp;
From models of the network vulnerabilities and potential attacker exploits, we compute attack graphs that convey the impact of individual and combined vulnerabilities on overall security.  ...  The interdependencies of network vulnerabilities make traditional point-wise vulnerability analysis inadequate.  ...  Acknowledgements This material is based upon work supported by Homeland Security Advanced Research Projects Agency under the contract FA8750-05-C-0212 administered by the Air Force Research Laboratory/  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4419-0140-8_7">doi:10.1007/978-1-4419-0140-8_7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qcmlgr3xqbgoljfvygzlsakw2u">fatcat:qcmlgr3xqbgoljfvygzlsakw2u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20090709155901/http://csis.gmu.edu/noel/pubs/2009_ARO_chapter.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/10/99/1099b5c967bf5524158a2001b7ccf70b3f86ef48.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4419-0140-8_7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Modelling and Analysing Network Security Policies in a Given Vulnerability Setting [chapter]

Roland Rieke
<span title="">2006</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
A graph of all possible attack paths is automatically computed from the model of an ICT network, of vulnerabilities, exploits and an attacker strategy.  ...  This paper presents an integrated framework for model-based symbolic interpretation, simulation and analysis with a comprehensive approach focussing on the validation of network security policies.  ...  Recent methods for analysis of attack graphs are extended to support analysis of abstract representations of these graphs.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11962977_6">doi:10.1007/11962977_6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fij2wsv5anapdcwb4kum2cq4dy">fatcat:fij2wsv5anapdcwb4kum2cq4dy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810154447/http://sit.sit.fraunhofer.de/smv/publications/download/rieke-critis06.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/26/83/268397200f0b44684f560f58375467ede8ddd1b4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11962977_6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures [chapter]

Zhendong Ma, Paul Smith
<span title="">2013</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In order to examine multi-step attacks that exploit chains of vulnerabilities, we map vulnerabilities into preconditions and effects, and use rule-based reasoning for identifying advanced attacks and their  ...  An important step in securing Critical Information Infrastructures (CIIs) against cyber-attacks is risk analysis -understanding security risks, based on a systematic analysis of information on vulnerabilities  ...  Acknowledgements This work has been supported by the "PRECYSE -Protection, prevention and reaction to cyber-attacks to critical infrastructures" project, funded by the European Commission with contract  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-03964-0_13">doi:10.1007/978-3-319-03964-0_13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gq4yeub7rvfrna3dnffefkveoy">fatcat:gq4yeub7rvfrna3dnffefkveoy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20140818104437/http://www.ait.ac.at/fileadmin/mc/safety_security/downloads/ma-smith-critis-2013.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b5/d5/b5d5bf4e889b96618f7d044aa2f2f8517eca9a32.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-03964-0_13"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Computer Network Vulnerability Assessment and Safety Evaluation Application based on Bayesian Theory

Xianyou Zhu
<span title="2016-12-31">2016</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4h7flaxsjnh6he3qbiwvxbekxe" style="color: black;">International Journal of Security and Its Applications</a> </i> &nbsp;
In this model, based on Bayes formula for calculating the probability of a new node probability calculation formula and attack paths occur for calculating network vulnerability assessment of the quantitative  ...  In this model, based on Bayes formula formula for calculating the probability of a new node probability calculation formula and attack paths occur for calculating network vulnerability assessment of the  ...  On the basis of Bayesian attribute attack graph, the calculated probability of success of each attack path for vulnerability assessment of the network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2016.10.12.29">doi:10.14257/ijsia.2016.10.12.29</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5qev7zemdfaarhef4g7u3htrpe">fatcat:5qev7zemdfaarhef4g7u3htrpe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603212443/http://www.sersc.org/journals/IJSIA/vol10_no12_2016/29.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ff/6e/ff6eb54dcf8ab48edec0c129aff0ab1a0f503ec3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2016.10.12.29"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Research on Multi-Target Network Security Assessment with Attack Graph Expert System Model

Yunpeng Li, Xi Li, Yi-Zhang Jiang
<span title="2021-05-07">2021</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/fw4azkpu65d2thmrwfkoawyxse" style="color: black;">Scientific Programming</a> </i> &nbsp;
Searching for practical security risk assessment methods is a research hotspot in the field of network security. Network attack graph model is an active detection technology for the attack path.  ...  It is an effective tool for analyzing network vulnerability.  ...  Compared with other models, the attack graph model simulates the real attack scenario and detects the vulnerability nodes in the network from the perspective of the attacker.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/9921731">doi:10.1155/2021/9921731</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/o2jcewlhnnaktfk4pv7vplaoaa">fatcat:o2jcewlhnnaktfk4pv7vplaoaa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210508115525/https://downloads.hindawi.com/journals/sp/2021/9921731.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3e/51/3e51f281d653c7e2eec27d2ee18efb385a924524.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/9921731"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Attack Graph Generation and Analysis Techniques

Mridul Sankar Barik, Anirban Sengupta, Chandan Mazumdar
<span title="2016-10-31">2016</span> <i title="Defence Scientific Information and Documentation Centre"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sbz4qubtlrhx5a2wpmby2l2qfu" style="color: black;">Defence Science Journal</a> </i> &nbsp;
Attack graph is a modeling tool used in the assessment of security of enterprise networks.  ...  This paper presents a consolidated view of major attack graph generation and analysis techniques.  ...  The first step in this approach is to build a model of the system under analysis.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14429/dsj.66.10795">doi:10.14429/dsj.66.10795</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qfklg22ienfkrflngqwyrdd6au">fatcat:qfklg22ienfkrflngqwyrdd6au</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181030061024/http://publications.drdo.gov.in/ojs/index.php/dsj/article/download/10795/5714" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/00/c2/00c24079bbc7d8136b934e2767fdb8d3191dee96.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14429/dsj.66.10795"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

An OVAL-based active vulnerability assessment system for enterprise computer networks

Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
<span title="2008-06-04">2008</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xi63yvd5dfgsvlbc4jby5bebjm" style="color: black;">Information Systems Frontiers</a> </i> &nbsp;
It is shown that the NetScope system is well suited for vulnerability assessment of large-scale computer networks such as campus networks and enterprise networks.  ...  The vulnerabilities and known attacks with their prerequisites and consequences are modeled based on predicate logic theory and are correlated so as to automatically construct potential attack paths with  ...  Acknowledgements The authors would like to thank Mr. Michael Serwatka for his careful proof reading of the paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10796-008-9111-6">doi:10.1007/s10796-008-9111-6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/aujhcc4gw5etlk3febbiz4m35q">fatcat:aujhcc4gw5etlk3febbiz4m35q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120323230055/http://www.cfins.au.tsinghua.edu.cn/files/paper/An%20OVAL-based%20active%20vulnerability%20assessment%20system.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5c/2b/5c2b1c13fbcb7d071760a44ddb9187daab2b1620.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10796-008-9111-6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 143,787 results