메뉴 건너뛰기




Volumn 82, Issue 8, 2006, Pages 523-541

An Approach to Model Network Exploitations Using Exploitation Graphs

Author keywords

computer security; Exploitation graph (e graph); graph based modeling; vulnerability graph

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; GRAPHIC METHODS; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 33750734683     PISSN: 00375497     EISSN: None     Source Type: Journal    
DOI: 10.1177/0037549706072046     Document Type: Article
Times cited : (24)

References (34)
  • 1
    • 33749620156 scopus 로고    scopus 로고
    • STAT scanner
    • STAT scanner. 2004. Available from: http://www.stat.harris.com/solutions/vuln_assess/scanner_index.asp
    • (2004)
  • 4
    • 84968652680 scopus 로고    scopus 로고
    • Attack trees
    • Schneier, B. 1999. Attack trees. Dr. Dobb's Journal 24 (12): 21-29.
    • (1999) Dr. Dobb's Journal , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1
  • 5
    • 84867339043 scopus 로고    scopus 로고
    • Alert correlation in a cooperative intrusion detection framework
    • Los Alamitos, CA: IEEE Computer Society Press.
    • Cuppens, F., and A. Miege. 2002. Alert correlation in a cooperative intrusion detection framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, 187-200. Los Alamitos, CA: IEEE Computer Society Press.
    • (2002) Proceedings of the 2002 IEEE Symposium on Security and Privacy , pp. 187-200
    • Cuppens, F.1    Miege, A.2
  • 15
    • 0036093547 scopus 로고    scopus 로고
    • Model-based analysis of configuration vulnerabilities
    • Ramakrishnan, C. R., and R. Sekar. 2002. Model-based analysis of configuration vulnerabilities. Journal of Computer Security 10 (1-2): 189-209.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 189-209
    • Ramakrishnan, C.R.1    Sekar, R.2
  • 16
    • 33745463192 scopus 로고    scopus 로고
    • Building simplified exploitation graphs for a cluster computing environment
    • Los Alamitos, CA: IEEE Computer Society Press.
    • Li, W., and R. B. Vaughn. 2005. Building simplified exploitation graphs for a cluster computing environment. In Proceedings of the 6th IEEE Information Assurance Workshop, 50-57. Los Alamitos, CA: IEEE Computer Society Press.
    • (2005) Proceedings of the 6th IEEE Information Assurance Workshop , pp. 50-57
    • Li, W.1    Vaughn, R.B.2
  • 17
    • 33744457628 scopus 로고    scopus 로고
    • Common Vulnerability Exposures
    • Common Vulnerability Exposures. 2004. Available from: http://cve.mitre.org/
    • (2004)
  • 22
    • 27544454296 scopus 로고    scopus 로고
    • An access control model for securecluster-computingenvironments
    • Proceedingsofthe38th Hawaii International Conference on System Sciences Los Alamitos, CA: IEEE Computer Society Press. Full paper available on proceedings CD.
    • Li, W., and E. B. Allen. 2005. An access control model for securecluster-computingenvironments. In Proceedingsofthe38th Hawaii International Conference on System Sciences, 309-310. Los Alamitos, CA: IEEE Computer Society Press. Full paper available on proceedings CD.
    • (2005) , pp. 309-310
    • Li, W.1    Allen, E.B.2
  • 23
    • 84993793422 scopus 로고    scopus 로고
    • BugtraqVulnerabilitiesArchive
    • BugtraqVulnerabilitiesArchive.2004.Availablefrom:http://www.securityfocus.com/bid
    • (2004)
  • 24
    • 84993794237 scopus 로고    scopus 로고
    • CERT® Advisories
    • CERT® Advisories. 2004. Available from: http://www.cert.org/advisories
    • (2004)
  • 25
    • 84879638397 scopus 로고    scopus 로고
    • National Vulnerability Database
    • National Vulnerability Database. 2005. Available from: http://nvd.nist.gov/
    • (2005)
  • 26
    • 84858888235 scopus 로고    scopus 로고
    • SANS Top 20 Vulnerabilities
    • SANS Top 20 Vulnerabilities. 2004. Available from: http://www.sans.org/top20/
    • (2004)
  • 27
    • 33749612332 scopus 로고    scopus 로고
    • An approach to graph-based modeling of network exploitations
    • PhD diss., Department of Computer Science, Mississippi State University
    • Li, W. 2005.An approach to graph-based modeling of network exploitations. PhD diss., Department of Computer Science, Mississippi State University.
    • (2005)
    • Li, W.1
  • 28
    • 51149114808 scopus 로고    scopus 로고
    • Graphviz
    • Graphviz. 2004. Available from: http://www.research.att.com/sw/tools/graphviz/
    • (2004)
  • 29
    • 27744583699 scopus 로고    scopus 로고
    • ICAT Metabase
    • ICAT Metabase. 2004.Available from: http://icat.nist.gov/icat.cfm
    • (2004)
  • 30
    • 0003518833 scopus 로고
    • Classification and detection of computer intrusions
    • PhD diss., Department of Computer Science, Purdue University, West Lafayette, IN.
    • Kumar, S. 1995. Classification and detection of computer intrusions. PhD diss., Department of Computer Science, Purdue University, West Lafayette, IN.
    • (1995)
    • Kumar, S.1
  • 31
    • 0141462933 scopus 로고    scopus 로고
    • Attack development for intrusion detection evaluation
    • Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology.
    • Das, K. J. 2000. Attack development for intrusion detection evaluation. Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology.
    • (2000)
    • Das, K.J.1
  • 34
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Ortalo, R., Y. Deswarte, and M. Kaaniche. 1999. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 25 (5): 633-665.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-665
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.