نتایج جستجو برای: cost sensitive attack graph

تعداد نتایج: 915732  

Journal: :IEEE Transactions on Knowledge and Data Engineering 2021

Recent studies have shown that graph neural networks (GNNs) are vulnerable against perturbations due to lack of robustness and can therefore be easily fooled. Currently, most works on attacking GNNs mainly using gradient information guide the attack achieve outstanding performance. However, high complexity time space makes them unmanageable for large scale graphs becomes major bottleneck preven...

2010
Nwokedi C. Idika Bharat Bhargava Aditya Mathur

Idika, Nwokedi C. Ph.D., Purdue University, August, 2010. Characterizing and Aggregating Attack Graph-based Security Metrics. Major Professor: Bharat K. Bhargava. An attack graph is an abstraction that represents the ways an attacker can violate a security policy by leveraging interdependencies among discovered vulnerabilities. Attack graph analyses that extract security-relevant information fr...

2002
Somesh Jha Oleg Sheyner Jeannette M. Wing

An attack graph is a succinct representation of all paths through a system that end in a state where an intruder has successfully achieved his goal. Today Red Teams determine the vulnerability of networked systems by drawing gigantic attack graphs by hand. Constructing attack graphs by hand is tedious, error-prone, and impractical for large systems. By viewing an attack as a violation of a safe...

Journal: :Journal of Computer Security 2002
Wenke Lee Wei Fan Matthew Miller Salvatore J. Stolfo Erez Zadok

Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion detection models. We examine the major cost factors associated with an IDS, which include development cost, operational cost, damage cost due to successful intrusions, and the cost of manual and automated response to ...

Journal: :IOP Conference Series: Earth and Environmental Science 2021

2012
Tito Waluyo Purboyo

In this paper, we discussed the development of Attack Graph-Based Security Metrics that will be used to evaluate the security of a network. Attack Graph-Based Security Metrics recently used simultaneously to form a Multiple Attack Graph-Based Security Metrics. Furthermore, Multiple Attack Graph-Based Security Metrics were used to evaluate the two networks so it can be inferred which network is ...

2005
TAO ZHANG MING-ZENG HU XIAO-CHUN YUN YONG-ZHENG ZHANG

As an important method to analyze the security states of computer network, the generation of network attack graph is a hot topic in this domain. After analyzing network vulnerabilities, linking relation between devices and the characteristic of attack, the model of network security states is built, and the generating algorithm of attack graph is implemented. The experiment validates the prototy...

Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...

H. Ghasemzadeh H. Mehrara M. Tajik Khasss

Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...

Journal: :IEEE Transactions on Information Forensics and Security 2022

Host-based threats such as Program Attack, Malware Implantation, and Advanced Persistent Threats (APT), are commonly adopted by modern attackers. Recent studies propose leveraging the rich contextual information in data provenance to detect a host. Data is directed acyclic graph constructed from system audit data. Nodes represent entities (e.g., <italic xmlns:mml="http://www.w3.org/1998/Math/Ma...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید