Two Formal Analyses of Attack Graphs ∗

@inproceedings{Jha2002TwoFA,
  title={Two Formal Analyses of Attack Graphs ∗},
  author={S. Jha},
  year={2002}
}
An attack graph is a succinct representation of all paths through a system that end in a state where an intruder has successfully achieved his goal. Today Red Teams determine the vulnerability of networked systems by drawing gigantic attack graphs by hand. Constructing attack graphs by hand is tedious, error-prone, and impractical for large systems. By viewing an attack as a violation of a safety property, we can use off-the-shelf model checking technology to produce attack graphs automatically… CONTINUE READING
Highly Influential
This paper has highly influenced 23 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 351 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 215 extracted citations

351 Citations

02040'02'05'09'13'17
Citations per Year
Semantic Scholar estimates that this publication has 351 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 15 references

Two formal analyses of attack graphs

  • S. Jha, O. Sheyener, J. M. Wing
  • Technical Report CMU-CS-02-109, Carnegie Mellon…
  • 2002
3 Excerpts

Probabilistic alert detection

  • A. Valdes, K. Skinner
  • Recent Advances in Intrusion Detection (RAID),
  • 2001
1 Excerpt

Computer-attack graph generation tool

  • L. P. Swiler, C. Phillips, D. Ellis, S. Chakerian
  • Proceedings of the DARPA Information…
  • 2000
2 Excerpts

Model Checking

  • E. M. Clarke, O. Grumberg, D. Peled
  • MIT Press,
  • 2000
1 Excerpt

Similar Papers

Loading similar papers…