Sciweavers

1028 search results - page 1 / 103
» Using Attack Graphs to Design Systems
Sort
View
50 views 51 votes 15 years 2 months ago  IEEESP 2007»
163 views 112 votes 15 years 8 months ago  DSN 2005»
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
175 views 142 votes 15 years 3 months ago  CMS 2006»
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
131 views 98 votes 15 years 9 months ago  ACSAC 2009»
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
154 views 118 votes 15 years 7 months ago  FMCO 2003»
Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulne...
113 views 104 votes 15 years 8 months ago  IFIP 2007»
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
184 views 152 votes 15 years 3 months ago  SEC 2008»
Design diversity is a well-known method to ensure fault tolerance. Such a method has also been applied successfully in various projects to provide intrusion detection and tolerance...
200 views 134 votes 15 years 1 months ago  CCS 2010»
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
93 views 127 votes 15 years 2 months ago  JNSM 2008»
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
159 views 130 votes 15 years 6 months ago  CCS 2006»
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...