메뉴 건너뛰기




Volumn , Issue , 2011, Pages 31-40

Distilling critical attack graph surface iteratively through Minimum-Cost SAT Solving

Author keywords

[No Author keywords available]

Indexed keywords

AMOUNT OF INFORMATION; ANALYSIS ACCURACY; ATTACK GRAPH; ATTACK PATH; BOOLEAN FORMULAE; COST METRICS; CRITICAL PATHS; ENTERPRISE NETWORKS; IN-DEPTH ANALYSIS; ITERATIVE PROCESS; LEAST COST; MULTI-STEP ATTACKS; NETWORK SCENARIO; RISK METRICS; SAT-SOLVING; SECURITY PROBLEMS; SYSTEM ADMINISTRATORS;

EID: 84862960819     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2076732.2076738     Document Type: Conference Paper
Times cited : (48)

References (37)
  • 5
    • 0012945946 scopus 로고    scopus 로고
    • Models and tools for quantitative assessment of operational security
    • M. Dacier, Y. Deswarte, and M. Kaaniche. Models and tools for quantitative assessment of operational security. In IFIP SEC, 1996.
    • (1996) IFIP SEC
    • Dacier, M.1    Deswarte, Y.2    Kaaniche, M.3
  • 11
    • 78149373289 scopus 로고    scopus 로고
    • A sound and practical approach to quantifying security risk in enterprise networks
    • J. Homer, X. Ou, and D. Schmidt. A sound and practical approach to quantifying security risk in enterprise networks. Technical report, Kansas State University, 2009.
    • (2009) Technical Report Kansas State University
    • Homer, J.1    Ou, X.2    Schmidt, D.3
  • 15
    • 20444498659 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • V. Kumar, J. Srivastava, and A. Lazarevic, editors, chapter 5. Kluwer Academic Publisher
    • S. Jajodia, S. Noel, and B. O'Berry. Topological analysis of network attack vulnerability. In V. Kumar, J. Srivastava, and A. Lazarevic, editors, Managing Cyber Threats: Issues, Approaches and Challanges, chapter 5. Kluwer Academic Publisher, 2003.
    • (2003) Managing Cyber Threats: Issues, Approaches and Challanges
    • Jajodia, S.1    Noel, S.2    O'Berry, B.3
  • 19
    • 26444568158 scopus 로고    scopus 로고
    • Zchaff2004: An efficient SAT solver
    • Theory and Applications of Satisfiability Testing: 7th International Conference, SAT 2004. Revised Selected Papers
    • Y. S. Mahajan, Z. Fu, and S. Malik. Zchaff2004: An efficient SAT solver. In Lecture Notes in Computer Science SAT2004 Special Volume, pages 360-375. LNCS 3542, 2004. (Pubitemid 41422894)
    • (2005) Lecture Notes in Computer Science , vol.3542 , pp. 360-375
    • Mahajan, Y.S.1    Fu, Z.2    Malik, S.3
  • 22
    • 0036576020 scopus 로고    scopus 로고
    • Search pruning techniques in SAT-based branch-and-bound algorithms for the binate covering problem
    • DOI 10.1109/43.998623, PII S0278007002028488
    • V. M. Manquinho and J. ao P. Marques-Silva. Search pruning techniques in SAT-based branch-and-bound algorithmsfor the binate covering problem. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 21:505-516, 2002. (Pubitemid 34630864)
    • (2002) IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems , vol.21 , Issue.5 , pp. 505-516
    • Manquinho, V.M.1    Marques-Silva, J.P.2
  • 37
    • 33750984193 scopus 로고    scopus 로고
    • Minimum-cost network hardening using attack graphs
    • DOI 10.1016/j.comcom.2006.06.018, PII S0140366406002271
    • L. Wang, S. Noel, and S. Jajodia. Minimum-cost network hardening using attack graphs. Computer Communications, 29:3812-3824, November 2006. (Pubitemid 44751132)
    • (2006) Computer Communications , vol.29 , Issue.18 , pp. 3812-3824
    • Wang, L.1    Noel, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.