메뉴 건너뛰기




Volumn 3, Issue 2, 2010, Pages 67-75

Coupled Petri nets for computer network risk analysis

Author keywords

Computer network attack modeling; Petri nets; Risk analysis

Indexed keywords

ANALYSIS TECHNIQUES; ATTACK ANALYSIS; COMPUTER NETWORK ATTACK MODELING; COMPUTER NETWORK ATTACKS; COVERABILITY; CYBER-ATTACKS; IN-PROCESS CONTROL; NETWORK HOSTS; NOVEL APPLICATIONS; PETRI NET REPRESENTATIONS; PROCESS FAILURE;

EID: 77955052106     PISSN: 18745482     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijcip.2010.05.002     Document Type: Article
Times cited : (22)

References (18)
  • 1
    • 70449638991 scopus 로고    scopus 로고
    • Evaluating the risk of cyber attacks on SCADA systems via Petri net analysis with application to hazardous liquid loading operations, in: Proceedings of the IEEE International Conference on Technologies for Homeland Security.
    • M. Henry, R. Layer, D. Zaret, Evaluating the risk of cyber attacks on SCADA systems via Petri net analysis with application to hazardous liquid loading operations, in: Proceedings of the IEEE International Conference on Technologies for Homeland Security, 2009, pp. 607-614.
    • (2009) , pp. 607-614
    • Henry, M.1    Layer, R.2    Zaret, D.3
  • 2
    • 77955056385 scopus 로고
    • The minimal coverability graph for Petri nets, in: Proceedings of the Twelfth International Conference on Applications and Theory of Petri Nets.
    • A. Finkel, The minimal coverability graph for Petri nets, in: Proceedings of the Twelfth International Conference on Applications and Theory of Petri Nets, 1991, pp. 210-243.
    • (1991) , pp. 210-243
    • Finkel, A.1
  • 4
    • 77955050570 scopus 로고    scopus 로고
    • The use of attack trees in assessing vulnerabilities in SCADA systems, in: Presented at the International Infrastructure Survivability Workshop
    • E. Byres, M. Franz, D. Miller, The use of attack trees in assessing vulnerabilities in SCADA systems, in: Presented at the International Infrastructure Survivability Workshop, 2004.
    • (2004)
    • Byres, E.1    Franz, M.2    Miller, D.3
  • 5
    • 58849103145 scopus 로고    scopus 로고
    • A comprehensive network security risk model for process control networks
    • Henry M., Haimes Y. A comprehensive network security risk model for process control networks. Risk Analysis 2009, 29(2):223-248.
    • (2009) Risk Analysis , vol.29 , Issue.2 , pp. 223-248
    • Henry, M.1    Haimes, Y.2
  • 6
    • 33749639831 scopus 로고    scopus 로고
    • Quantitative cyber risk reduction estimation methodology for a small SCADA control system, in: Proceedings of the Thirty-Ninth Hawaii International Conference on System Sciences.
    • M. McQueen, W. Boyer, M. Flynn, G. Beitel, Quantitative cyber risk reduction estimation methodology for a small SCADA control system, in: Proceedings of the Thirty-Ninth Hawaii International Conference on System Sciences, 2006, p. 226.
    • (2006) , pp. 226
    • McQueen, M.1    Boyer, W.2    Flynn, M.3    Beitel, G.4
  • 7
    • 0004245148 scopus 로고
    • William Kaufmann, Los Angeles, California
    • Lowrance W. Of Acceptable Risk 1976, William Kaufmann, Los Angeles, California.
    • (1976) Of Acceptable Risk
    • Lowrance, W.1
  • 8
    • 77955057236 scopus 로고    scopus 로고
    • Using coloured petri nets in penetration testing, Master's Thesis, Department of Computer Science and Media Technology, Gjovik University College, Gjovik, Norway
    • O. Dahl, Using coloured petri nets in penetration testing, Master's Thesis, Department of Computer Science and Media Technology, Gjovik University College, Gjovik, Norway, 2005.
    • Dahl, O.1
  • 9
    • 0034593376 scopus 로고    scopus 로고
    • Attack net penetration testing, in: Proceedings of the New Security Paradigms Workshop
    • J. McDermott, Attack net penetration testing, in: Proceedings of the New Security Paradigms Workshop, 2000, pp. 15-21.
    • (2000) , pp. 15-21
    • McDermott, J.1
  • 10
    • 8344285730 scopus 로고    scopus 로고
    • Colored Petri-net-based attack modeling, in: Proceedings of the Ninth International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular Computing.
    • S. Zhou, Z. Qin, F. Zhang, X. Zhang, W. Chen, J. Liu, Colored Petri-net-based attack modeling, in: Proceedings of the Ninth International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular Computing, 2003, pp. 715-718.
    • (2003) , pp. 715-718
    • Zhou, S.1    Qin, Z.2    Zhang, F.3    Zhang, X.4    Chen, W.5    Liu, J.6
  • 11
    • 77950793246 scopus 로고    scopus 로고
    • Modeling modern network attacks and countermeasures using attack graphs, in: Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference,
    • K. Ingols, M. Chu, R. Lippmann, S. Webster, S. Boyer, Modeling modern network attacks and countermeasures using attack graphs, in: Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009, pp. 81-90.
    • (2009) , pp. 81-90
    • Ingols, K.1    Chu, M.2    Lippmann, R.3    Webster, S.4    Boyer, S.5
  • 12
    • 0010225535 scopus 로고    scopus 로고
    • Decidability and complexity of Petri net problems - An introduction
    • Springer-Verlag, New York, Lectures on Petri Nets I: Basic Models; Advances in Petri Nets
    • Esparza J. Decidability and complexity of Petri net problems - An introduction. Lecture Notes in Computer Science 1998, vol. 1491:374-428. Springer-Verlag, New York.
    • (1998) Lecture Notes in Computer Science , vol.1491 , pp. 374-428
    • Esparza, J.1
  • 13
    • 0024645936 scopus 로고
    • Petri nets: Properties, analysis and applications
    • Murata T. Petri nets: Properties, analysis and applications. Proceedings of the IEEE 1989, 77(4):541-580.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.4 , pp. 541-580
    • Murata, T.1
  • 16
    • 70350509050 scopus 로고    scopus 로고
    • Robust multiobjective dynamic programming: minimax envelopes for efficient decisionmaking under scenario uncertainty
    • Henry M., Haimes Y. Robust multiobjective dynamic programming: minimax envelopes for efficient decisionmaking under scenario uncertainty. Journal of Industrial and Management Optimization 2009, 5(4):791-824.
    • (2009) Journal of Industrial and Management Optimization , vol.5 , Issue.4 , pp. 791-824
    • Henry, M.1    Haimes, Y.2
  • 18
    • 58349095777 scopus 로고    scopus 로고
    • Property preservation by Petri-net-based refinements in system design, in: Proceedings of the Ninth International Conference for Young Computer Scientists.
    • C. Xia, Property preservation by Petri-net-based refinements in system design, in: Proceedings of the Ninth International Conference for Young Computer Scientists, 2008, pp. 240-246.
    • (2008) , pp. 240-246
    • Xia, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.