Sciweavers

1028 search results - page 2 / 103
» Using Attack Graphs to Design Systems
Sort
View
113 views 104 votes 15 years 8 months ago  IFIP 2007»
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
184 views 152 votes 15 years 3 months ago  SEC 2008»
Design diversity is a well-known method to ensure fault tolerance. Such a method has also been applied successfully in various projects to provide intrusion detection and tolerance...
200 views 133 votes 15 years 1 months ago  CCS 2010»
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
93 views 127 votes 15 years 2 months ago  JNSM 2008»
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
159 views 130 votes 15 years 6 months ago  CCS 2006»
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
222 views 146 votes 13 years 10 months ago  COMSNETS 2012»
—Recently, there has been significant research interest in leveraging social networks to defend against Sybil attacks. While much of this work may appear similar at first glanc...
228 views 176 votes 15 years 3 months ago  CONEXT 2009»
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
83 views 110 votes 15 years 2 months ago  INFSOF 2007»
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
139 views 146 votes 15 years 11 days ago  GAMESEC 2010»
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, an...
146 views 128 votes 15 years 8 months ago  COMPSAC 2008»
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...