Sciweavers

1028 search results - page 1 / 206
» Using Attack Graphs to Design Systems
Sort
View
IEEESP
2007
50views more  IEEESP 2007»
13 years 5 months ago
Using Attack Graphs to Design Systems
Suvajit Gupta, Joel Winstead
DSN
2005
IEEE
13 years 11 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
CMS
2006
175views Communications» more  CMS 2006»
13 years 6 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
ACSAC
2009
IEEE
14 years 4 days ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
FMCO
2003
Springer
154views Formal Methods» more  FMCO 2003»
13 years 10 months ago
Tools for Generating and Analyzing Attack Graphs
Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulne...
Oleg Sheyner, Jeannette M. Wing