Attack Graph Generation with Infused Fuzzy Clustering

@inproceedings{Misra2009AttackGG,
  title={Attack Graph Generation with Infused Fuzzy Clustering},
  author={S. Misra and M. Obaidat and Atig Bagchi and R. Bhatt and Soumalya Ghosh},
  booktitle={SECRYPT},
  year={2009}
}
Modern networks have been growing rapidly in size and complexity, making manual vulnerability assessment and mitigation impractical. Automation of these tasks is desired (Obaidat and Boudriga, 2007; Bhattacharya et al., 2008). Existing network security tools can be classified into the following two approaches: proactive (such as vulnerability scanning and use of firewalls) and reactive (intrusion detection system). The modus operandi of proactive approaches have an edge over the reactive ones… Expand
5 Citations

References

SHOWING 1-9 OF 9 REFERENCES
A graph-based system for network-vulnerability analysis
  • 738
  • PDF
Computer-attack graph generation tool
  • 335
A scalable representation towards attack graph generation
  • 12
  • Highly Influential
Automated generation and analysis of attack graphs
  • 1,271
  • PDF
A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters
  • J. Dunn
  • Mathematics, Computer Science
  • 1973
  • 5,555
  • PDF
An insecurity flow model
  • 33
  • PDF
Pattern Recognition with Fuzzy Objective Function Algorithms
  • J. Bezdek
  • Computer Science
  • Advanced Applications in Pattern Recognition
  • 1981
  • 15,007
  • Highly Influential
Sheynar, “Scenario Graphs and Attack Graph,
  • PhD Thesis, Carnegei Mellan University,
  • 2004