A planner-based approach to generate and analyze minimal attack graph

@article{Ghosh2010APA,
  title={A planner-based approach to generate and analyze minimal attack graph},
  author={Nirnay Ghosh and Soumya K. Ghosh},
  journal={Applied Intelligence},
  year={2010},
  volume={36},
  pages={369-390}
}
In the present scenario, even well administered networks are susceptible to sophisticated cyber attacks. Such attack combines vulnerabilities existing on different systems/services and are potentially more harmful than single point attacks. One of the methods for analyzing such security vulnerabilities in an enterprise network is the use of attack graph. It is a complete graph which gives a succinct representation of different attack scenarios, depicted by attack paths. An attack path is a… CONTINUE READING
Highly Cited
This paper has 35 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 20 extracted citations

An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception

IEEE Transactions on Information Forensics and Security • 2018
View 5 Excerpts
Highly Influenced

Cyber-Attack Modeling Analysis Techniques: An Overview

2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) • 2016
View 11 Excerpts
Highly Influenced

Finding the minimum cut set in attack graphs using genetic algorithms

2013 International Conference on Computer Applications Technology (ICCAT) • 2013
View 3 Excerpts
Highly Influenced

An Extension of Haruspex to Cover Vulnerabilities in Application Environments

2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP) • 2016
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 33 references

PDDL2.1: An Extension to PDDL for Expressing Temporal Planning Domains

J. Artif. Intell. Res. • 2003
View 6 Excerpts
Highly Influenced

Automated Generation and Analysis of Attack Graphs

IEEE Symposium on Security and Privacy • 2002
View 8 Excerpts
Highly Influenced

Scalable, graph-based network vulnerability analysis

ACM Conference on Computer and Communications Security • 2002
View 7 Excerpts
Highly Influenced

Modelling internet attacks. In: Proceedings of the second annual IEEE SMC information assurance workshop, United States Military Academy, West Point, New York

T Tidwell, R Larson, K Fitch, J Hale
2001
View 4 Excerpts
Highly Influenced

Using Model Checking to Analyze Network Vulnerabilities

IEEE Symposium on Security and Privacy • 2000
View 4 Excerpts
Highly Influenced

Security risk management of local area network

N Ghosh, SK Ghosh
2008

Security risk management of local area network. Master’s thesis, School of Information

S Bhattacharya
2008
View 2 Excerpts

Similar Papers

Loading similar papers…