메뉴 건너뛰기




Volumn , Issue , 2009, Pages 66-73

Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients

Author keywords

Attack graph; Hypergraph; Network attack; Vulnerability assessment

Indexed keywords

AMBIENTS; ATTACK GRAPH; COMMERCIAL OFF-THE-SHELF SOFTWARES; DYNAMIC ASPECTS; HYPERGRAPH; IN-NETWORK; MOBILE AMBIENTS; MODELLING AND SIMULATIONS; MULTI-STEP ATTACKS; NETWORK ATTACK; NETWORK DOMAINS; SECURITY BREACHES; SECURITY POLICY; STEPPING STONE; VULNERABILITY ASSESSMENTS;

EID: 72949101002     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1529282.1529294     Document Type: Conference Paper
Times cited : (17)

References (34)
  • 4
    • 29144460240 scopus 로고    scopus 로고
    • Monographs in Computer Science. Springer, New York
    • L. Cardelli. Bioware Languages, pages 59-65. Monographs in Computer Science. Springer, New York, 2004.
    • (2004) Bioware Languages , pp. 59-65
    • Cardelli, L.1
  • 5
    • 84947919695 scopus 로고    scopus 로고
    • Mobile Ambients
    • Foundations of Software Science and Computation Structures: First International Conference, FOSSACS'98, of, Berlin Germany, Springer-Verlag
    • L. Cardelli and A. D. Gordon. Mobile Ambients. In Foundations of Software Science and Computation Structures: First International Conference, FOSSACS'98, volume 1378 of LNCS, pages 140-155, Berlin Germany, 1998. Springer-Verlag.
    • (1998) LNCS , vol.1378 , pp. 140-155
    • Cardelli, L.1    Gordon, A.D.2
  • 9
    • 46749110444 scopus 로고    scopus 로고
    • V. N. L. Franqueira and R. H. C. Lopes. Vulnerability Assessment by Learning Attack Specifications in Graphs. In IAS'07: Proc. of the 3rd Int. Symposium on Information Assurance and Security, pages 161-164, August 2007.
    • V. N. L. Franqueira and R. H. C. Lopes. Vulnerability Assessment by Learning Attack Specifications in Graphs. In IAS'07: Proc. of the 3rd Int. Symposium on Information Assurance and Security), pages 161-164, August 2007.
  • 10
    • 72949105563 scopus 로고    scopus 로고
    • Multi-step Attack Modelling and Simulation (MsAMS) Framework based on Mobile Ambients
    • Technical Report TR-CTIT-08-44, Centre for Telematics and Information Technology CTIT, University of Twente, Enschede, The Netherlands, June
    • V. N. L. Franqueira, R. H. C. Lopes, and P. van Eck. Multi-step Attack Modelling and Simulation (MsAMS) Framework based on Mobile Ambients. Technical Report TR-CTIT-08-44, Centre for Telematics and Information Technology (CTIT), University of Twente, Enschede, The Netherlands, June 2008.
    • (2008)
    • Franqueira, V.N.L.1    Lopes, R.H.C.2    van Eck, P.3
  • 11
    • 84958956850 scopus 로고    scopus 로고
    • Attacks against computer network: Formal grammar-based framework and simulation tool
    • A.Wespi, G.Vigna, and L.Deri, editors, RAID 2002: Proc. of the Fifth Int. Symposium on Recent Advances in Intrusion Detection, of, Springer, October
    • V. Gorodetski and I. Kotenko. Attacks against computer network: Formal grammar-based framework and simulation tool. In A.Wespi, G.Vigna, and L.Deri, editors, RAID 2002: Proc. of the Fifth Int. Symposium on Recent Advances in Intrusion Detection, volume 2516 of LNCS, pages 219-238. Springer, October 2002.
    • (2002) LNCS , vol.2516 , pp. 219-238
    • Gorodetski, V.1    Kotenko, I.2
  • 13
    • 0003843704 scopus 로고    scopus 로고
    • Prentice Hall International, second edition, June 2004. online version at
    • C. A. R. Hoare. Communicating Sequential Processes. Prentice Hall International, second edition, June 2004. online version at http://www.usingcsp. com/cspbook.pdf.
    • Communicating Sequential Processes
    • Hoare, C.A.R.1
  • 17
    • 84868050969 scopus 로고    scopus 로고
    • Mass hack infects tens of thousands of sites
    • publisehd on January 7, 2008
    • G. Keizer. Mass hack infects tens of thousands of sites. Computerworld, publisehd on January 7, 2008. http://www.computerworld.com/action/article.do? command=viewArticleBasic&taxonomyId=16&articleId=9055858&intsrc= hm-topic. Visited 10-July-2008.
    • Computerworld
    • Keizer, G.1
  • 18
    • 0032256758 scopus 로고    scopus 로고
    • Authoritative Sources in a Hyperlinked Environment
    • Proc. Ninth Ann, New York, ACM Press
    • J. M. Kleinberg. Authoritative Sources in a Hyperlinked Environment. In In Proc. Ninth Ann. ACM-SIAM Symp. Discrete Algorithms, pages 668-677, New York, 1998. ACM Press.
    • (1998) ACM-SIAM Symp. Discrete Algorithms , pp. 668-677
    • Kleinberg, J.M.1
  • 20
    • 33750734683 scopus 로고    scopus 로고
    • An approach to model network exploitations using exploitation graphs
    • W. Li, R. B. Vaughn, and Y. S. Dandass. An approach to model network exploitations using exploitation graphs. Simulation, 82(8):523-541, 2006.
    • (2006) Simulation , vol.82 , Issue.8 , pp. 523-541
    • Li, W.1    Vaughn, R.B.2    Dandass, Y.S.3
  • 21
    • 26444469178 scopus 로고    scopus 로고
    • Pure bigraphs
    • Technical Report UCAM-CL-TR-614, University of Cambridge, January
    • R. Milner. Pure bigraphs. Technical Report UCAM-CL-TR-614, University of Cambridge, January 2005.
    • (2005)
    • Milner, R.1
  • 27
    • 0033718255 scopus 로고    scopus 로고
    • Using Model Checking to Analyze Network Vulnerabilities
    • Washington, DC, USA, IEEE Computer Society
    • R. W. Ritchey and P. Ammann. Using Model Checking to Analyze Network Vulnerabilities. In SP'00: Proc. of the 2000 IEEE Symposium on Security and Privacy, pages 156-165, Washington, DC, USA, 2000. IEEE Computer Society.
    • (2000) SP'00: Proc. of the 2000 IEEE Symposium on Security and Privacy , pp. 156-165
    • Ritchey, R.W.1    Ammann, P.2
  • 28
    • 72949086620 scopus 로고    scopus 로고
    • R. Sawilla and X. Ou. Googling Attack Graphs. Technical Report TM-2007-205, Defense Research and Development Canada, September 2007. http://www.ottawa.drdc-rddc.gc.ca/html/tm-2007-205-e.html.
    • R. Sawilla and X. Ou. Googling Attack Graphs. Technical Report TM-2007-205, Defense Research and Development Canada, September 2007. http://www.ottawa.drdc-rddc.gc.ca/html/tm-2007-205-e.html.
  • 30
    • 33645334192 scopus 로고
    • The net of reciprocal influence: A problem in treating sociometric data
    • J. R. Seeley. The net of reciprocal influence: A problem in treating sociometric data. Canadian Jounal of Psychology, 3:234-240, 1949.
    • (1949) Canadian Jounal of Psychology , vol.3 , pp. 234-240
    • Seeley, J.R.1
  • 31
    • 35048885033 scopus 로고    scopus 로고
    • O. Sheyner and J. Wing. Tools for Generating and Analyzing Attack Graphs. In In Proc. of Workshop on Formal Methods for Components and Objects, LNCS 3188, pages 344-371, Germany, 2004. Springer-Verlag.
    • O. Sheyner and J. Wing. Tools for Generating and Analyzing Attack Graphs. In In Proc. of Workshop on Formal Methods for Components and Objects, LNCS 3188, pages 344-371, Germany, 2004. Springer-Verlag.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.