Classification and detection of computer intrusions
Classification and detection of computer intrusions
An analysis of security incidents on the Internet 1989-1995
An analysis of security incidents on the Internet 1989-1995
A graph-based system for network-vulnerability analysis
Proceedings of the 1998 workshop on New security paradigms
Attack net penetration testing
Proceedings of the 2000 workshop on New security paradigms
Artificial Intelligence: A Modern Approach
Artificial Intelligence: A Modern Approach
Automated Generation and Analysis of Attack Graphs
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
XML Primer Plus
How to Systematically Classify Computer Security Intrusions
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Application of Clustering Techniques in a Network Security Testing System
Proceedings of the 2005 conference on Artificial Intelligence Research and Development
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
HAIS '09 Proceedings of the 4th International Conference on Hybrid Artificial Intelligence Systems
Towards Modelling Information Security with Key-Challenge Petri Nets
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Algebra for capability based attack correlation
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Using attack and protection trees to analyze threats and defenses to homeland security
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Analysis of vulnerability assessment results based on CAOS
Applied Soft Computing
Effective network vulnerability assessment through model abstraction
DIMVA'11 Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
An empirical study on using the national vulnerability database to predict software vulnerabilities
DEXA'11 Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I
A hybrid ranking approach to estimate vulnerability for dynamic attacks
Computers & Mathematics with Applications
A planner-based approach to generate and analyze minimal attack graph
Applied Intelligence
Unsupervised case memory organization: analysing computational time and soft computing capabilities
ECCBR'06 Proceedings of the 8th European conference on Advances in Case-Based Reasoning
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
Cohesion factors: improving the clustering capabilities of consensus
IDEAL'06 Proceedings of the 7th international conference on Intelligent Data Engineering and Automated Learning
Aggregating vulnerability metrics in enterprise networks using attack graphs
Journal of Computer Security
Hi-index | 0.00 |
Network security analysis must coordinate diversesources of information to support effective security models.The modeling process must capture security-relevantinformation about targets and attackers. By capturingthe trust relationships, vulnerabilities, and attackercapabilities, a security analyst can define and characterizecomplex, multi-stage attacks. Along with conductingsystematic analyses on multi-stage attacks, the opportunityalso exists to facilitate large scale detection and visualizationof security events by embedding modelingand analytical components within a more expansive securityframework. This paper presents a formalism andmethodology for multi-stage network attack analysis. Applicationsto network security management, including anetwork vulnerability analyzer prototype, are also described.