Understanding complex network attack graphs through clustered adjacency matrices

@article{Noel2005UnderstandingCN,
  title={Understanding complex network attack graphs through clustered adjacency matrices},
  author={Steven Noel and Sushil Jajodia},
  journal={21st Annual Computer Security Applications Conference (ACSAC'05)},
  year={2005},
  pages={10 pp.-169}
}
We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency matrices to show attacker reachability across the network for a given number of attack steps, culminating in transitive closure for attack prediction over all possible number of steps. This reachability analysis provides a concise summary of the impact of network configuration changes on the attack graph. Using our framework, we also place… CONTINUE READING
Highly Cited
This paper has 96 citations. REVIEW CITATIONS

10 Figures & Tables

Topics

Statistics

051015'06'07'08'09'10'11'12'13'14'15'16'17'18
Citations per Year

96 Citations

Semantic Scholar estimates that this publication has 96 citations based on the available data.

See our FAQ for additional information.