메뉴 건너뛰기




Volumn 21, Issue 4, 2013, Pages 561-597

Aggregating vulnerability metrics in enterprise networks using attack graphs

Author keywords

Attack graphs; Enterprise network security management; Risk assessment; Vulnerability metrics

Indexed keywords

ATTACK GRAPH; EMPIRICAL EVALUATIONS; ENTERPRISE NETWORKS; NETWORK CONFIGURATION; PROBABILISTIC GRAPHICAL MODELS; PROBABILISTIC REASONING; SOFTWARE VULNERABILITIES; VULNERABILITY METRICS;

EID: 84890017132     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-130475     Document Type: Article
Times cited : (113)

References (48)
  • 5
    • 33747205462 scopus 로고    scopus 로고
    • On the brittleness of software and the infeasibility of security metrics
    • S. Bellovin, On the brittleness of software and the infeasibility of security metrics, IEEE Security & Privacy 4(4) (2006), 96 pp.
    • (2006) IEEE Security & Privacy , vol.4 , Issue.4 , pp. 96
    • Bellovin, S.1
  • 6
    • 0012945946 scopus 로고    scopus 로고
    • Models and tools for quantitative assessment of operational security
    • M. Dacier, Y. Deswarte and M. Kaâniche, Models and tools for quantitative assessment of operational security, in: IFIP SEC, 1996.
    • (1996) IFIP SEC
    • Dacier, M.1    Deswarte, Y.2    Kaâniche, M.3
  • 11
    • 3042720722 scopus 로고    scopus 로고
    • Information security: Why the future belongs to the quants
    • D. Geer Jr., K. Soo Hoo and A. Jaquith, Information security: Why the future belongs to the quants, IEEE Security & Privacy 1(4) (2003), 24-32.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.4 , pp. 24-32
    • Geer Jr., D.1    Soo Hoo, K.2    Jaquith, A.3
  • 13
    • 81455142740 scopus 로고    scopus 로고
    • Extending attack graph-based security metrics and aggregating their application
    • N. Idika and B. Bhargava, Extending attack graph-based security metrics and aggregating their application, IEEE Transactions on Dependable and Secure Computing 9(1) (2012), 75-85.
    • (2012) IEEE Transactions on Dependable and Secure Computing , vol.9 , Issue.1 , pp. 75-85
    • Idika, N.1    Bhargava, B.2
  • 19
    • 33750734683 scopus 로고    scopus 로고
    • An approach to model network exploitations using exploitation graphs
    • W. Li, R.B. Vaughn and Y.S. Dandass, An approach to model network exploitations using exploitation graphs, Simulation 82(8) (2006), 523-541.
    • (2006) Simulation , vol.82 , Issue.8 , pp. 523-541
    • Li, W.1    Vaughn, R.B.2    Dandass, Y.S.3
  • 29
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • R. Ortalo, Y. Deswarte and M. Kaâniche, Experimenting with quantitative evaluation tools for monitoring operational security, IEEE Transactions on Software Engineering 25(5) (1999), 633-650.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaâniche, M.3
  • 30
    • 38049113070 scopus 로고    scopus 로고
    • A logic-programming approach to network security analysis
    • X. Ou, A logic-programming approach to network security analysis, PhD thesis, Princeton University, 2005.
    • (2005) PhD Thesis Princeton University
    • Ou, X.1
  • 34
    • 0003798347 scopus 로고
    • Probabilistic reasoning in intelligent systems: Networks of plausible inference
    • J. Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference, Morgan Kaufman, 1988.
    • (1988) Morgan Kaufman
    • Pearl, J.1
  • 43
    • 0001790593 scopus 로고
    • Depth-first search and linear graph algorithms
    • R. Tarjan, Depth-first search and linear graph algorithms, SIAM Journal on Computing 1(2) (1972), 146-160.
    • (1972) SIAM Journal on Computing , vol.1 , Issue.2 , pp. 146-160
    • Tarjan, R.1
  • 46
    • 33750984193 scopus 로고    scopus 로고
    • Minimum-cost network hardening using attack graphs
    • L. Wang, S. Noel and S. Jajodia, Minimum-cost network hardening using attack graphs, Computer Communications 29 (2006), 3812-3824.
    • (2006) Computer Communications , vol.29 , pp. 3812-3824
    • Wang, L.1    Noel, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.