Attack scenario graphs for computer network threat analysis and prediction

被引:18
|
作者
Hughes, T [1 ]
Sheyner, O
机构
[1] Lockheed Martin Adv Technol Labs, Cherry Hill, NJ 08002 USA
[2] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15213 USA
关键词
D O I
10.1002/cplx.20001
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
引用
收藏
页码:15 / 18
页数:4
相关论文
共 50 条
  • [1] Scenario-based threat detection and attack analysis
    Hsiu, PC
    Kuo, CF
    Kuo, TW
    Juan, EYT
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 279 - 282
  • [2] Network Attack Prediction Method Based on Threat Intelligence
    Wang, Junshe
    Yi, Yuzi
    Zhang, Hongbin
    Cao, Ning
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 151 - 160
  • [3] Network attack prediction method based on threat intelligence for IoT
    Hongbin Zhang
    Yuzi Yi
    Junshe Wang
    Ning Cao
    Qiang Duan
    Multimedia Tools and Applications, 2019, 78 : 30257 - 30270
  • [4] Network attack prediction method based on threat intelligence for IoT
    Zhang, Hongbin
    Yi, Yuzi
    Wang, Junshe
    Cao, Ning
    Duan, Qiang
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (21) : 30257 - 30270
  • [5] Survivability Analysis of a Computer System Under an Advanced Persistent Threat Attack
    Rodriguez, Ricardo J.
    Chang, Xiaolin
    Li, Xiaodan
    Trivedi, Kishor S.
    GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2016, 2016, 9987 : 134 - 149
  • [6] New Attack Scenario Prediction Methodology
    Fayyad, Seraj
    Meinel, Cristoph
    PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2013, : 53 - 59
  • [7] Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach
    Moskal, Stephen
    Yang, Shanchieh Jay
    Kuhl, Michael E.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (01): : 13 - 29
  • [8] Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs
    Gylling, Andreas
    Ekstedt, Mathias
    Afzal, Zeeshan
    Eliasson, Per
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 304 - 311
  • [9] Attack scenario reconstruction via fusing heterogeneous threat intelligence
    Zang, Xiaodong
    Gong, Jian
    Zhang, Xinchang
    Li, Guiqing
    COMPUTERS & SECURITY, 2023, 133