An Augmented 0-day Attack Graph Generation Method
نویسندگان
چکیده
منابع مشابه
An Atomic-Domains-Based Approach for Attack Graph Generation
Attack graph is an integral part of modeling the overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at the whole network, which makes the process of AGG complex and non-scalable. In this paper, we...
متن کاملAttack Graph Generation with Implementation in Network Security
As an important method to analyze the security states of computer network, the generation of network attack graph is a hot topic in this domain. After analyzing network vulnerabilities, linking relation between devices and the characteristic of attack, the model of network security states is built, and the generating algorithm of attack graph is implemented. The experiment validates the prototy...
متن کاملAn Attack Graph-Based Probabilistic Security Metric
To protect critical resources in today’s networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities. This now becomes feasible due to a model of causal relationships between vulnerabilities, namely, attack graph. This paper proposes an attack graph-based probabilistic metric for network security and studies its effici...
متن کاملAttack Graph to Graph Database
Databases are an integral part of almost any computing system today, and users heavily rely on the services they provide. When we interact with a computing system, we expect that any data be stored for future use, that the data is able to be looked up quickly, and that we can perform complex queries against the data stored in the database. There are many different emerging database types availa...
متن کاملScenario Day 0 Day 10 Day
There are many applications which arise in telecommunications information processing in which it is useful, and often necessary, to create and access multiple hypothetical states. These might correspond to future states reeecting pending updates (such as customer service orders), or hypothetical alternative states that would arise in the exploration of diierent solutions to a given problem. In ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: DEStech Transactions on Computer Science and Engineering
سال: 2017
ISSN: 2475-8841
DOI: 10.12783/dtcse/aice-ncs2016/5712