Sciweavers

50 search results - page 1 / 10
» Automated Generation and Analysis of Attack Graphs
Sort
View
SP
2002
IEEE
132views Security Privacy» more  SP 2002»
13 years 10 months ago
Automated Generation and Analysis of Attack Graphs
Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richar...
CCS
2007
ACM
14 years 5 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
FMCO
2003
Springer
154views Formal Methods» more  FMCO 2003»
14 years 4 months ago
Tools for Generating and Analyzing Attack Graphs
Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulne...
Oleg Sheyner, Jeannette M. Wing
CCS
2006
ACM
14 years 2 months ago
Attack graph generation and analysis
In this paper, we position the correct way of using graphical models for enhancing cyber security analysis in enterprise networks. Graphical models can be powerful in representati...
Jeannette M. Wing
CCS
2005
ACM
14 years 4 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar