An OVAL-based active vulnerability assessment system for enterprise computer networks
Information Systems Frontiers
Specifying and verifying organizational security properties in first-order logic
Verification, induction termination analysis
Specifying and verifying organizational security properties in first-order logic
Verification, induction termination analysis
Intelligent network-based early warning systems
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Autonomous agents and multi –agent systems (AAMAS) for the military – issues and challenges
DAMAS'05 Proceedings of the 2005 international conference on Defence Applications of Multi-Agent Systems
Hi-index | 0.00 |
The paper describes the formal approach and software tool "Attack Simulator" intended for active vulnerability assessment of computer network security policy at the stages of design and deployment of network security systems. The suggested approach is based on stochasticgrammar-based models of attacks and is realized via automatic imitation of remote computer network attacks of different complexity. The paper characterizes the Attack Simulator architecture and the processes of generating malicious actions against computer networkmodel and real-life computer networks. The results of experiments that demonstrate the Attack Simulator efficiency are described in detail.