Artificial intelligence: a modern approach
Artificial intelligence: a modern approach
A graph-based system for network-vulnerability analysis
Proceedings of the 1998 workshop on New security paradigms
Scalable, graph-based network vulnerability analysis
Proceedings of the 9th ACM conference on Computer and communications security
Representing TCP/IP Connectivity For Topological Analysis of Network Security
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Automated Generation and Analysis of Attack Graphs
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Using Model Checking to Analyze Network Vulnerabilities
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Managing attack graph complexity through visual hierarchical aggregation
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
A Host-Based Approach to Network Attack Chaining Analysis
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs
CCGRID '06 Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid
A scalable approach to attack graph generation
Proceedings of the 13th ACM conference on Computer and communications security
Practical Attack Graph Generation for Network Defense
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
Topological analysis of network attack vulnerability
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Temporal planning using subgoal partitioning and resolution in SGPlan
Journal of Artificial Intelligence Research
Interactive analysis of attack graphs using relational queries
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Hi-index | 0.00 |
Security is a challenging task for today's network administration. Usually, attackers penetrate into a network through a chain of exploits. Such an exploit sequence can be termed as an attack path, and the set of all possible attack paths forms an attack graph. In this paper, we propose a novel Artificial Intelligence (AI) based approach to find out an attack path consisting of logically connected exploits, which essentially shows the minimum number of exploits required to obtain access over a critical network asset. The solution is further extended to form an attack graph for the enterprise network.