메뉴 건너뛰기




Volumn , Issue , 2007, Pages 262-269

Guiding threat analysis with threat source models

(4)  Clark, K a   Lee, C a   Tyree, S a   Hale, J a  

a NONE

Author keywords

Adversary profiling; Attack graphs; Threat analysis; Threat modeling

Indexed keywords

COMPUTATIONAL COMPLEXITY; GRAPH THEORY; RISK ANALYSIS; RISK MANAGEMENT; SAFETY ENGINEERING;

EID: 48749106465     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAW.2007.381942     Document Type: Conference Paper
Times cited : (4)

References (27)
  • 1
    • 77950899230 scopus 로고    scopus 로고
    • Know your enemy
    • tech. rep, Honeynet Project
    • "Know your enemy," tech. rep., Honeynet Project, 2000.
    • (2000)
  • 2
    • 48749104937 scopus 로고    scopus 로고
    • Adversary modeling to develop forensic observables,
    • BBN
    • J. Lowry, R. Valdex, and B. Wood, "Adversary modeling to develop forensic observables," tech. rep., BBN.
    • tech. rep
    • Lowry, J.1    Valdex, R.2    Wood, B.3
  • 7
    • 48749084273 scopus 로고    scopus 로고
    • Observations on the effects of defense in depth on adversary behavior in cyber warfare,
    • BBN
    • D. Kewley and J. Lowry, "Observations on the effects of defense in depth on adversary behavior in cyber warfare," tech. rep., BBN.
    • tech. rep
    • Kewley, D.1    Lowry, J.2
  • 15
    • 35248829694 scopus 로고    scopus 로고
    • th International Symposium of Formal Methods Europe (FME '03), no. 2805 in LNCS, pp. 914-940, Springer-Verlag, September 2003.
    • th International Symposium of Formal Methods Europe (FME '03), no. 2805 in LNCS, pp. 914-940, Springer-Verlag, September 2003.
  • 16
    • 0038289826 scopus 로고
    • Kuang: Rule-based security checking,
    • MIT, Lab for Computer Science Programming Systems Research Group, Cambridge, MA, May
    • R. Baldwin, "Kuang: Rule-based security checking," tech. rep., MIT, Lab for Computer Science Programming Systems Research Group, Cambridge, MA, May 1994.
    • (1994) tech. rep
    • Baldwin, R.1
  • 17
    • 85076884574 scopus 로고    scopus 로고
    • MulVAL: A logic-based network security analyzer
    • Usenix, IEEE, August
    • X. Ou, S. Govindavajhala, and A. Appel, "MulVAL: A logic-based network security analyzer," in 14th Usenix Security Symposium, pp. 113-128, Usenix, IEEE, August 2005.
    • (2005) 14th Usenix Security Symposium , pp. 113-128
    • Ou, X.1    Govindavajhala, S.2    Appel, A.3
  • 18
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • December
    • B. Schneier, "Attack trees: Modeling security threats," Dr. Dobb's Journal, pp. 21-29, December 1999.
    • (1999) Dr. Dobb's Journal , pp. 21-29
    • Schneier, B.1
  • 21
    • 48749121426 scopus 로고    scopus 로고
    • Model checking and expert system approaches to attack graphs,
    • University of California, Davis, Davis, CA, August
    • S. Cheetancheri, "Model checking and expert system approaches to attack graphs," tech. rep., University of California, Davis, Davis, CA, August 2004.
    • (2004) tech. rep
    • Cheetancheri, S.1
  • 25
    • 35148858636 scopus 로고    scopus 로고
    • System and method for risk detection and analysis in a computer network,
    • October, United States Patent No. 6,952,779
    • G. Cohen, M. Meiseles, and E. Reshef, "System and method for risk detection and analysis in a computer network," October 2005. United States Patent No. 6,952,779.
    • (2005)
    • Cohen, G.1    Meiseles, M.2    Reshef, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.