메뉴 건너뛰기




Volumn , Issue , 2008, Pages 153-158

Active cyber attack model for network system's vulnerability assessment

Author keywords

Attack pattern; Attack tree; Cyber attack

Indexed keywords

AUTONOMOUS AGENTS; CRIME; FORESTRY; NETWORK SECURITY;

EID: 48349094169     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICISS.2008.36     Document Type: Conference Paper
Times cited : (19)

References (17)
  • 1
    • 84927689287 scopus 로고    scopus 로고
    • A formal method for attack modeling and detection (tr-06-01)
    • Technical report, Rensselaer Polytechnic Institute, Computer Science Department, January
    • S. A. Camtepe and B. Yener. A formal method for attack modeling and detection (tr-06-01). Technical report, Rensselaer Polytechnic Institute, Computer Science Department, January 2006.
    • (2006)
    • Camtepe, S.A.1    Yener, B.2
  • 4
    • 48349106171 scopus 로고    scopus 로고
    • A. Futoransky, L. Notarfrancesco, R. Gerardo, and S. Carlos. Building computer network attacks. Technical report, CoreLabs
    • A. Futoransky, L. Notarfrancesco, R. Gerardo, and S. Carlos. Building computer network attacks. Technical report, CoreLabs.
  • 6
    • 48349090996 scopus 로고    scopus 로고
    • S. Jha, O. Sheyner, and J. Wing. Minimization and reliability analyses of attack graphs(minimization and reliability analyses of attack graphs). Technical report, School of Computer Science Carnegie Mellon University, february 2002.
    • S. Jha, O. Sheyner, and J. Wing. Minimization and reliability analyses of attack graphs(minimization and reliability analyses of attack graphs). Technical report, School of Computer Science Carnegie Mellon University, february 2002.
  • 7
    • 34547366032 scopus 로고    scopus 로고
    • Intelligent retrieval agent based on distributed environment
    • August
    • H. K. Kim. Intelligent retrieval agent based on distributed environment, pages 137-143. Proceeding of 4th SERA, August 2006.
    • (2006) Proceeding of 4th SERA , pp. 137-143
    • Kim, H.K.1
  • 9
    • 84856542536 scopus 로고    scopus 로고
    • Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in internet
    • June
    • I. Kotenko. Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in internet. Proceedings 19th ECMS, June 2005.
    • (2005) Proceedings 19th ECMS
    • Kotenko, I.1
  • 11
    • 48349129128 scopus 로고    scopus 로고
    • Monitoring and investigation of dos attack
    • February
    • J. Y. Lee, M. S. Yoon, and H. Lee. Monitoring and investigation of dos attack. KNOM Review, 6(2):33-40, February 2004.
    • (2004) KNOM Review , vol.6 , Issue.2 , pp. 33-40
    • Lee, J.Y.1    Yoon, M.S.2    Lee, H.3
  • 12
    • 0038226150 scopus 로고    scopus 로고
    • Attack modeling for information security and survivability (cmu/sci-2001-tn-001)
    • Technical report, CMU/SEI, March
    • A. P. Moore, R. J. Ellison, and R. C. Linger. Attack modeling for information security and survivability (cmu/sci-2001-tn-001). Technical report, CMU/SEI, March 2001.
    • (2001)
    • Moore, A.P.1    Ellison, R.J.2    Linger, R.C.3
  • 13
    • 0035381945 scopus 로고    scopus 로고
    • Information warfare: Battles in cyberspace
    • June
    • R. E. Overill. Information warfare: battles in cyberspace. Computing and Control Engineering Journal, 12(3): 125-128, June 2001.
    • (2001) Computing and Control Engineering Journal , vol.12 , Issue.3 , pp. 125-128
    • Overill, R.E.1
  • 14
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal.
    • Dr. Dobb's Journal
    • Schneier, B.1
  • 17
    • 0009516633 scopus 로고    scopus 로고
    • A process control approach to cyber attack detection
    • August
    • N. Ye, J. Giordano, and J. Feldman. A process control approach to cyber attack detection. Communications of the ACM, 44(8):77-82, August 2001.
    • (2001) Communications of the ACM , vol.44 , Issue.8 , pp. 77-82
    • Ye, N.1    Giordano, J.2    Feldman, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.