메뉴 건너뛰기




Volumn , Issue , 2009, Pages 127-136

Evaluating network security with two-layer attack graphs

Author keywords

Adjacency matrix; Attack graphs; Network security; Prioritized list

Indexed keywords

ADJACENCY MATRICES; ATTACK GRAPH; ATTACK GRAPHS; COMPUTATION COSTS; EVALUATION RESULTS; GRAY-SCALE IMAGES; LARGE NETWORKS; MEASUREMENT METHODOLOGY; NETWORK ADMINISTRATOR; REAL TIME; SECURITY MEASUREMENT; STEPPING STONE; TWO LAYERS; UPPER BOUND; UPPER LAYER; WEIGHT FACTOR;

EID: 77950788192     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2009.22     Document Type: Conference Paper
Times cited : (27)

References (25)
  • 3
    • 79959542172 scopus 로고    scopus 로고
    • Toward measuring network security using attack graphs
    • G. Karjoth and K. Stølen, Eds. ACM
    • L. Wang, A. Singhal, and S. Jajodia, "Toward measuring network security using attack graphs," in QoP, G. Karjoth and K. Stølen, Eds. ACM, 2007, pp. 49-54.
    • (2007) QoP , pp. 49-54
    • Wang, L.1    Singhal, A.2    Jajodia, S.3
  • 4
    • 84944727025 scopus 로고    scopus 로고
    • Efficient minimum-cost network hardening via exploit dependency graphs
    • IEEE Computer Society
    • S. Noel, S. Jajodia, B. O'Berry, and M. Jacobs, "Efficient minimum-cost network hardening via exploit dependency graphs," in ACSAC. IEEE Computer Society, 2003, pp. 86-95.
    • (2003) ACSAC , pp. 86-95
    • Noel, S.1    Jajodia, S.2    O'Berry, B.3    Jacobs, M.4
  • 5
    • 50249085983 scopus 로고    scopus 로고
    • An attack graph-based probabilistic security metric
    • DBSec, ser. V. Atluri, Ed., Springer
    • L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia, "An attack graph-based probabilistic security metric," in DBSec, ser. Lecture Notes in Computer Science, V. Atluri, Ed., vol. 5094. Springer, 2008, pp. 283-296.
    • (2008) Lecture Notes in Computer Science , vol.5094 , pp. 283-296
    • Wang, L.1    Islam, T.2    Long, T.3    Singhal, A.4    Jajodia, S.5
  • 6
    • 34547454437 scopus 로고    scopus 로고
    • A weakest-adversary security metric for network configuration security analysis
    • G. Karjoth and F. Massacci, Eds. ACM
    • J. Pamula, S. Jajodia, P. Ammann, and V. Swarup, "A weakest-adversary security metric for network configuration security analysis," in QoP, G. Karjoth and F. Massacci, Eds. ACM, 2006, pp. 31-38.
    • (2006) QoP , pp. 31-38
    • Pamula, J.1    Jajodia, S.2    Ammann, P.3    Swarup, V.4
  • 7
    • 70349303945 scopus 로고    scopus 로고
    • Measuring network security using dynamic bayesian network
    • A. Ozment and K. Stølen, Eds. ACM
    • M. Frigault, L. Wang, A. Singhal, and S. Jajodia, "Measuring network security using dynamic bayesian network," in QoP, A. Ozment and K. Stølen, Eds. ACM, 2008, pp. 23-30.
    • (2008) QoP , pp. 23-30
    • Frigault, M.1    Wang, L.2    Singhal, A.3    Jajodia, S.4
  • 9
    • 20444498659 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • V. Kumar, J. Srivastava, and A. Lazarevic, Eds. Kluwer Academic Publisher
    • S. Jajodia, S. Noel, and B. OBerry, "Topological analysis of network attack vulnerability," in Managing Cyber Threats: Issues, Approaches and Challenges, V. Kumar, J. Srivastava, and A. Lazarevic, Eds. Kluwer Academic Publisher, 2003.
    • (2003) Managing Cyber Threats: Issues, Approaches and Challenges
    • Jajodia, S.1    Noel, S.2    OBerry, B.3
  • 11
    • 57049131581 scopus 로고    scopus 로고
    • Identifying critical attack assets in dependency attack graphs
    • ESORICS, ser. S. Jajodia and J. López, Eds., Springer
    • R. E. Sawilla and X. Ou, "Identifying critical attack assets in dependency attack graphs," in ESORICS, ser. Lecture Notes in Computer Science, S. Jajodia and J. López, Eds., vol. 5283. Springer, 2008, pp. 18-34.
    • (2008) Lecture Notes in Computer Science , vol.5283 , pp. 18-34
    • Sawilla, R.E.1    Ou, X.2
  • 12
    • 33846269000 scopus 로고    scopus 로고
    • A host-based approach to network attack chaining analysis
    • IEEE Computer Society
    • P. Ammann, J. Pamula, J. A. Street, and R. W. Ritchey, "A host-based approach to network attack chaining analysis," in ACSAC. IEEE Computer Society, 2005, pp. 72-84.
    • (2005) ACSAC , pp. 72-84
    • Ammann, P.1    Pamula, J.2    Street, J.A.3    Ritchey, R.W.4
  • 13
    • 55849106311 scopus 로고    scopus 로고
    • On system security metrics and the definition approaches
    • IEEE
    • A. Hecker, "On system security metrics and the definition approaches," in SECURWARE. IEEE, 2008, pp. 412-419.
    • (2008) SECURWARE , pp. 412-419
    • Hecker, A.1
  • 18
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • R. Ortalo, Y. Deswarte, and M. Kaâniche, "Experimenting with quantitative evaluation tools for monitoring operational security," IEEE Trans. Software Eng., vol. 25, no. 5, pp. 633-650, 1999.
    • (1999) IEEE Trans. Software Eng. , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaâniche, M.3
  • 20
    • 39049104457 scopus 로고    scopus 로고
    • Practical attack graph generation for network defense
    • IEEE Computer Society
    • K. Ingols, R. Lippmann, and K. Piwowarski, "Practical attack graph generation for network defense," in ACSAC. IEEE Computer Society, 2006, pp. 121-130.
    • (2006) ACSAC , pp. 121-130
    • Ingols, K.1    Lippmann, R.2    Piwowarski, K.3
  • 21
    • 33846293304 scopus 로고    scopus 로고
    • Understanding complex network attack graphs through clustered adjacency matrices
    • IEEE Computer Society
    • S. Noel and S. Jajodia, "Understanding complex network attack graphs through clustered adjacency matrices," in ACSAC. IEEE Computer Society, 2005, pp. 160-169.
    • (2005) ACSAC , pp. 160-169
    • Noel, S.1    Jajodia, S.2
  • 22
    • 56449109390 scopus 로고    scopus 로고
    • A graph-theoretic visualization approach to network risk analysis
    • VizSEC, ser. J. R. Goodall, G. J. Conti, and K.-L. Ma, Eds., Springer
    • S. O'Hare, S. Noel, and K. Prole, "A graph-theoretic visualization approach to network risk analysis," in VizSEC, ser. Lecture Notes in Computer Science, J. R. Goodall, G. J. Conti, and K.-L. Ma, Eds., vol. 5210. Springer, 2008, pp. 60-67.
    • (2008) Lecture Notes in Computer Science , vol.5210 , pp. 60-67
    • O'Hare, S.1    Noel, S.2    Prole, K.3
  • 23
    • 56449106688 scopus 로고    scopus 로고
    • Improving attack graph visualization through data reduction and attack grouping
    • VizSEC, ser. J. R. Goodall, G. J. Conti, and K.-L. Ma, Eds., Springer
    • J. Homer, A. Varikuti, X. Ou, and M. A. McQueen, "Improving attack graph visualization through data reduction and attack grouping," in VizSEC, ser. Lecture Notes in Computer Science, J. R. Goodall, G. J. Conti, and K.-L. Ma, Eds., vol. 5210. Springer, 2008, pp. 68-79.
    • (2008) Lecture Notes in Computer Science , vol.5210 , pp. 68-79
    • Homer, J.1    Varikuti, A.2    Ou, X.3    McQueen, M.A.4
  • 25
    • 84958977733 scopus 로고    scopus 로고
    • Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
    • D. L. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in RAID, 2002, pp. 17-35.
    • (2002) RAID , pp. 17-35
    • Donoho, D.L.1    Flesia, A.G.2    Shankar, U.3    Paxson, V.4    Coit, J.5    Staniford, S.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.