메뉴 건너뛰기




Volumn , Issue , 2008, Pages 285-305

Topological vulnerability analysis: A powerful new approach for network attack prevention, detection, and response

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85116520518     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1142/9789812836243_0013     Document Type: Chapter
Times cited : (45)

References (20)
  • 1
    • 20444498659 scopus 로고    scopus 로고
    • Topological Analysis of Network Attack Vulnerability
    • V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher
    • S. Jajodia, S. Noel, and B. O’Berry (2005) Topological Analysis of Network Attack Vulnerability, in Managing Cyber Threats: Issues, Approaches and Challenges, V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher.
    • (2005) Managing Cyber Threats: Issues, Approaches and Challenges
    • Jajodia, S.1    Noel, S.2    O’Berry, B.3
  • 2
    • 85116514900 scopus 로고    scopus 로고
    • last retrieved April
    • R. Deraison, Nessus, http://www.nessus.org, last retrieved April 2007.
    • (2007) Nessus
    • Deraison, R.1
  • 3
  • 4
    • 42649129210 scopus 로고    scopus 로고
    • last retrieved April
    • Foundstone, FoundScan Frequently Asked Questions, http://www.foundstone. com/pdf/foundscan_general_faq.pdf, last retrieved April 2007.
    • (2007) FoundScan Frequently Asked Questions
  • 5
    • 85116524588 scopus 로고    scopus 로고
    • last retrieved April
    • Symantec Corporation, Symantec Discovery Overview, http://www.symantec. com/enterprise/products/overview.jsp?pcid=1025/&pvid=923_1, last retrieved April 2007.
    • (2007) Symantec Discovery Overview
    • Corporation, S.1
  • 7
    • 85116548291 scopus 로고    scopus 로고
    • last retrieved April
    • Security Focus, Bugtraq Vulnerabilities, http://www.securityfocus.com/ vulnerabilities, last retrieved April 2007.
    • (2007) Bugtraq Vulnerabilities
    • Focus, S.1
  • 14
    • 33750984193 scopus 로고    scopus 로고
    • Minimum-Cost Network Hardening Using Attack Graphs
    • L. Wang, S. Noel, S. Jajodia, Minimum-Cost Network Hardening Using Attack Graphs, Computer Communications, 29(18), pp. 3812-3824.
    • Computer Communications , vol.29 , Issue.18 , pp. 3812-3824
    • Wang, L.1    Noel, S.2    Jajodia, S.3
  • 20
    • 85116514361 scopus 로고    scopus 로고
    • Using Attack Graphs for Correlating, Hypothesizing, and Predicting Network Intrusion Alerts
    • L.Wang, A. Liu, S. Jajodia, Using Attack Graphs for Correlating, Hypothesizing, and Predicting Network Intrusion Alerts, Computer Communications, 29(15).
    • Computer Communications , vol.29 , pp. 15
    • Wang, L.1    Liu, A.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.