Attack graphs for defending cyber assets

Abstract

Next Generation security tools will have proactive security strategy far beyond the classical firewalls and antivirus scanners possess. Attack graphs vulnerabilities chain or multistage, multi-host attacks is valuable input for defenders. Importance of Attack graphs and one approach to formulate and use it to defend cyber assets has been put forward in this… (More)

Topics

Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.