A taxonomy for attack graph generation and usage in network security

@article{Kaynar2016ATF,
  title={A taxonomy for attack graph generation and usage in network security},
  author={Kerem Kaynar},
  journal={J. Inf. Sec. Appl.},
  year={2016},
  volume={29},
  pages={27-56}
}
Attack graphs model possible paths that a potential attacker can use to intrude into a target network. They can be used in determining both proactive and reactive security measures. Attack graph generation is a process that includes vulnerability information processing, collecting network topology and application information, determining reachability conditions among network hosts, and applying the core graph building algorithm. This article introduces a classification scheme for a systematical… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 18 CITATIONS

Multimodal Graph Analysis of Cyber Attacks

  • 2019 Spring Simulation Conference (SpringSim)
  • 2019
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 24 REFERENCES

Practical Attack Graph Generation for Network Defense

  • 2006 22nd Annual Computer Security Applications Conference (ACSAC'06)
  • 2006
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Automated generation and analysis of attack graphs

  • Proceedings 2002 IEEE Symposium on Security and Privacy
  • 2002
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

A Graph-based System for Network-vulnerability Analysis

  • Workshop on New Security Paradigms
  • 1998
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Cauldron mission-centric cyber situational awareness with defense in depth

  • 2011 - MILCOM 2011 Military Communications Conference
  • 2011
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Minimum-cost network hardening using attack graphs

  • Computer Communications
  • 2006
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Learning attack strategies from intrusion alerts

  • ACM Conference on Computer and Communications Security
  • 2003
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL