An Attack Modeling Based on Hierarchical Colored Petri Nets

@article{Wu2008AnAM,
  title={An Attack Modeling Based on Hierarchical Colored Petri Nets},
  author={Ruoyu Wu and Weiguo Li and He Huang},
  journal={2008 International Conference on Computer and Electrical Engineering},
  year={2008},
  pages={918-921}
}
Todaypsilas serious attacks are complex, multi-stage scenarios and can involve bypassing multiple security mechanisms and the use of numerous computer systems. A host which has been controlled by an attacker can become a stepping stone for further intrusion and destruction. Providing attack graphs is one of the most direct and effective way to analyze interactions among network components and sequences of vulnerabilities. However, the findings obtained from an attack graph highly depend on the… CONTINUE READING
Highly Cited
This paper has 36 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 15 extracted citations

Coloured Petri Nets for Modeling of Host-Based Attacks

Eduardo Aguirre, Karen A. Garćıa-Gamboa, Raúl Monroy
2009
View 10 Excerpts
Highly Influenced

Automatic Discovery of Software Attacks via Backward Reasoning

2015 IEEE/ACM 1st International Workshop on Software Protection • 2015
View 1 Excerpt

OpenFlow: A security analysis

2013 21st IEEE International Conference on Network Protocols (ICNP) • 2013

References

Publications referenced by this paper.
Showing 1-7 of 7 references

An annotated review of past papers on attack graphs

R. Lippmann, K.Ingols
Technical report, MIT Lincoln Laboratory, • 2005
View 1 Excerpt

Attack trees: [J

B. Schneier
Dr. Dobb's Journal of Software Tools, • 1999
View 2 Excerpts

The practitioner’s guide to coloured Petri nets

International Journal on Software Tools for Technology Transfer • 1998
View 1 Excerpt

Coloured Petri Nets

Monographs in Theoretical Computer Science An EATCS Series • 1997
View 1 Excerpt

Similar Papers

Loading similar papers…