A review of attack graph and attack tree visual syntax in cyber security

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attack Tree Visualization for Cyber Security Situational Awareness

Situational awareness in cyber domain is one of the key features for quick and accurate decision making and anomaly detection. In order to provide situational awareness, certain methods have been introduced so far and attack graph is one of them. Attack graphs help the security analyst to visualize the network topology and understand typical vulnerability and exploit behaviors in cyber domain (...

متن کامل

Review of Attack Detection Scheme for Cyber Physical Security System

Cyber-Physical Systems (CPSs) are characterized by integrating computation and physical processes. The theories and applications of CPSs face the enormous challenges that are (1) general workflow of cyber physical systems, (2) identifying the unique properties of cyber-physical systems and (3) discussing security mechanisms applicable to cyber physical systems. In particular, we analyze and we ...

متن کامل

Modeling the Security Analyst in a Cyber-Attack Scenario

In a corporate network, the situation awareness (SA) of a security analyst is of particular interest. The current work describes a cognitive Instance-Based Learning (IBL) model of an analyst’s recognition and comprehension processes in a cyber-attack scenario. The IBL model first recognizes network events based upon events’ situation attributes and their similarity to past experiences (instance...

متن کامل

Attack Graph Based Evaluation of Network Security

The perspective directions in evaluating network security are simulating possible malefactor’s actions, building the representation of these actions as attack graphs (trees, nets), the subsequent checking of various properties of these graphs, and determining security metrics which can explain possible ways to increase security level. The paper suggests a new approach to security evaluation bas...

متن کامل

Tradeoffs of Service, Security and Attack for Cyber System Survivability

Tradeoffs within the limitation of given system resources often have to be made for a cyber system to sustain its more critical services under the damage of cyber attacks. Understanding and modeling cause-effect dynamics of activities (service, security and attack), system state and Quality of Service (QoS) are essential to establish the dynamic adaptation capability of making tradeoffs among s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Science Review

سال: 2020

ISSN: 1574-0137

DOI: 10.1016/j.cosrev.2019.100219