Attack scenario graphs for computer network threat analysis and prediction

被引:18
|
作者
Hughes, T [1 ]
Sheyner, O
机构
[1] Lockheed Martin Adv Technol Labs, Cherry Hill, NJ 08002 USA
[2] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15213 USA
关键词
D O I
10.1002/cplx.20001
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
引用
收藏
页码:15 / 18
页数:4
相关论文
共 50 条
  • [41] Discussion on the Legal Regulation of Computer Network Attack
    Zhang, Min
    Zhong, Shuangxi
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON EDUCATION, SOCIAL SCIENCE, MANAGEMENT AND SPORTS (ICESSMS 2016), 2016, 92 : 8 - 10
  • [42] DMAT: A new network and computer attack classification
    Jiang, Wei
    Tian, Zhi-Hong
    Cui, Xiang
    Journal of Engineering Science and Technology Review, 2013, 6 (05) : 101 - 106
  • [43] Dynamic Model on DDoS Attack in Computer Network
    Kumar, Upendra
    Pandey, Samir Kumar
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [44] SecKG: Leveraging attack detection and prediction using knowledge graphs
    Kriaa, Siwar
    Chaabane, Yahia
    2021 12TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2021, : 112 - 119
  • [45] Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs
    Ahn, Woogeun
    Chung, Manhyun
    Min, Byung-Gil
    Seo, Jungtaek
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [46] Transplantation Attack: Analysis and Prediction
    Zhang, Zhongwen
    Xiang, Ji
    Wang, Lei
    Lei, Lingguang
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 367 - 374
  • [47] Gathering Threat Intelligence through Computer Network Deception
    Urias, Vincent E.
    Stout, William M. S.
    Lin, Han W.
    2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2016,
  • [48] Security Assessment of Computer Networks Based on Attack Graphs and Security Events
    Kotenko, Igor
    Doynikova, Elena
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 462 - 471
  • [49] Analysis of Social Engineering Threats with Attack Graphs
    Beckers, Kristian
    Krautsevich, Leanid
    Yautsiukhin, Artsiom
    DATA PRIVACY MANAGEMENT, AUTONOMOUS SPONTANEOUS SECURITY, AND SECURITY ASSURANCE, 2015, 8872 : 216 - 232
  • [50] Study on analysis of attack graphs based on conversion
    Yan, Feng
    Liu, Shu-Fen
    Leng, Huang
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2014, 42 (12): : 2477 - 2480