메뉴 건너뛰기




Volumn 27, Issue 5-6, 2008, Pages 188-196

Building network attack graph for alert causal correlation

Author keywords

Alert causal correlation; Attack graph; Exploit; Monotonic assumption; Network connectivity; Network security; Object oriented; Vulnerability

Indexed keywords

COMPUTER CRIME; CORRELATION METHODS; INTERNET; POLYNOMIAL APPROXIMATION;

EID: 53049102892     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.05.005     Document Type: Article
Times cited : (36)

References (17)
  • 1
    • 0038687692 scopus 로고    scopus 로고
    • Ammann P, Wijesekera D, Kaushik S. Scalable, graph-based network vulnerability analysis. In: Proceedings of ninth ACM conference on computer and communications security, Washington, DC, Nov 2002.
    • Ammann P, Wijesekera D, Kaushik S. Scalable, graph-based network vulnerability analysis. In: Proceedings of ninth ACM conference on computer and communications security, Washington, DC, Nov 2002.
  • 2
    • 53049102976 scopus 로고    scopus 로고
    • Artz M. NetSPA, a network security planning architecture. M.S. thesis, Cambridge: Massachusetts Institute of Technology; May 2002.
    • Artz M. NetSPA, a network security planning architecture. M.S. thesis, Cambridge: Massachusetts Institute of Technology; May 2002.
  • 3
    • 18844379625 scopus 로고    scopus 로고
    • Multiple behavior information fusion based quantitative threat evaluation
    • Chen X., Zheng Q., Guan X., et al. Multiple behavior information fusion based quantitative threat evaluation. Computers and Security 24 (2005) 218-231
    • (2005) Computers and Security , vol.24 , pp. 218-231
    • Chen, X.1    Zheng, Q.2    Guan, X.3
  • 4
    • 84867339043 scopus 로고    scopus 로고
    • Cuppens F, Miege A. Alert correlation in a cooperative intrusion detection framework. In: Proceedings of the 2002 IEEE symposium on security and privacy, May 2002.
    • Cuppens F, Miege A. Alert correlation in a cooperative intrusion detection framework. In: Proceedings of the 2002 IEEE symposium on security and privacy, May 2002.
  • 5
    • 53049093507 scopus 로고    scopus 로고
    • Dacier M, Deswarte Y. The privilege graph: an extension to the typed access martrix model. In: European symposium in computer security, Nov 1994.
    • Dacier M, Deswarte Y. The privilege graph: an extension to the typed access martrix model. In: European symposium in computer security, Nov 1994.
  • 6
    • 20444498659 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • Kumar V., Srivastava J., and Lazarevic A. (Eds), Kluwer Academic Publisher
    • Jajodia S., Noel S., and O'Berry B. Topological analysis of network attack vulnerability. In: Kumar V., Srivastava J., and Lazarevic A. (Eds). Managing Cyber Threats: Issues, Approaches and Challenges (2004), Kluwer Academic Publisher
    • (2004) Managing Cyber Threats: Issues, Approaches and Challenges
    • Jajodia, S.1    Noel, S.2    O'Berry, B.3
  • 7
    • 0033691924 scopus 로고    scopus 로고
    • Mayer A, Wool A, Elisha Z. Fang: a firewall analysis engine. In: Proceedings of the IEEE symposium on security and privacy, May 2000.
    • Mayer A, Wool A, Elisha Z. Fang: a firewall analysis engine. In: Proceedings of the IEEE symposium on security and privacy, May 2000.
  • 8
    • 0038011185 scopus 로고    scopus 로고
    • Ning P, Cui Y, Reeves DS. Constructing attack scenarios through correlation of intrusion alerts. In: Proceedings of the ninth ACM conference on computer and communications security, Washington, DC, Nov 2002.
    • Ning P, Cui Y, Reeves DS. Constructing attack scenarios through correlation of intrusion alerts. In: Proceedings of the ninth ACM conference on computer and communications security, Washington, DC, Nov 2002.
  • 9
    • 84944727025 scopus 로고    scopus 로고
    • Noel S, Jajodia S, O'Berry B, Jacobs M. Efficient minimum-cost network hardening via exploit dependency graphs. In: Proceedings of 19th annual computer security applications conference, Las Vegas, Nevada, Dec 2003.
    • Noel S, Jajodia S, O'Berry B, Jacobs M. Efficient minimum-cost network hardening via exploit dependency graphs. In: Proceedings of 19th annual computer security applications conference, Las Vegas, Nevada, Dec 2003.
  • 10
    • 21644481812 scopus 로고    scopus 로고
    • Noel S, Robertson E, Jajodia S. Correlating intrusion events and building attack scenarios through attack graph distances. In: Proceedings of the 20th annual computer security applications conference, 2004.
    • Noel S, Robertson E, Jajodia S. Correlating intrusion events and building attack scenarios through attack graph distances. In: Proceedings of the 20th annual computer security applications conference, 2004.
  • 11
    • 0033718255 scopus 로고    scopus 로고
    • Ritchey R, Ammann P. Using model checking to analyze network vulnerabilities. In: Proceedings of 2000 IEEE symposium on security and privacy, Oakland, California, 2000.
    • Ritchey R, Ammann P. Using model checking to analyze network vulnerabilities. In: Proceedings of 2000 IEEE symposium on security and privacy, Oakland, California, 2000.
  • 12
    • 84948965481 scopus 로고    scopus 로고
    • Ritchey R, O'Berry B, Noel S. Representing TCP/IP connectivity for topological analysis of network security. In: Proceedings of 18th annual computer security applications conference, Las Vegas, Nevada, Dec 2002.
    • Ritchey R, O'Berry B, Noel S. Representing TCP/IP connectivity for topological analysis of network security. In: Proceedings of 18th annual computer security applications conference, Las Vegas, Nevada, Dec 2002.
  • 13
    • 0036083194 scopus 로고    scopus 로고
    • Sheyner O, Haines J, Jha S, Lippmann R, Wing J. Automated generation and analysis of attack graphs. In: Proceedings of 2002 IEEE symposium on security and privacy, Oakland, California, 2002.
    • Sheyner O, Haines J, Jha S, Lippmann R, Wing J. Automated generation and analysis of attack graphs. In: Proceedings of 2002 IEEE symposium on security and privacy, Oakland, California, 2002.
  • 14
    • 53049104619 scopus 로고    scopus 로고
    • http://www.snort.org, web page [accessed 18.10.07].
    • http://www.snort.org, web page [accessed 18.10.07].
  • 15
    • 53049104758 scopus 로고    scopus 로고
    • http://osvdb.org, web page [accessed 18.10.07].
    • http://osvdb.org, web page [accessed 18.10.07].
  • 16
    • 53049093376 scopus 로고    scopus 로고
    • http://oval.mitre.org, web page [accessed 18.10.07].
    • http://oval.mitre.org, web page [accessed 18.10.07].
  • 17
    • 53049092956 scopus 로고    scopus 로고
    • Wang L, Liu A, Jajodia S. An efficient and unified approach to correlating, hypothesizing, and predicting intrusion alerts. In: Proceedings of the 10th European symposium on research in computer security application conference, 2004.
    • Wang L, Liu A, Jajodia S. An efficient and unified approach to correlating, hypothesizing, and predicting intrusion alerts. In: Proceedings of the 10th European symposium on research in computer security application conference, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.