2010
DOI: 10.1007/s10489-010-0266-8
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: In the present scenario, even well administered networks are susceptible to sophisticated cyber attacks. Such attack combines vulnerabilities existing on different systems/services and are potentially more harmful than single point attacks. One of the methods for analyzing such security vulnerabilities in an enterprise network is the use of attack graph. It is a complete graph which gives a succinct representation of different attack scenarios, depicted by attack paths. An attack path is a logical succession o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(32 citation statements)
references
References 27 publications
(48 reference statements)
0
32
0
Order By: Relevance
“…Of all the methods outlined in Table I, attack graphs (particularly those described by Barik and Mazumdar [47] and Ghosh and Ghosh [75]) and fault trees are able to represent these constructs with very little or no modification. Methods such as kill chains [70] and the diamond model [71] are not designed to represent the fundamental cyber-attack constructs.…”
Section: A Selection Of Amtmentioning
confidence: 99%
See 1 more Smart Citation
“…Of all the methods outlined in Table I, attack graphs (particularly those described by Barik and Mazumdar [47] and Ghosh and Ghosh [75]) and fault trees are able to represent these constructs with very little or no modification. Methods such as kill chains [70] and the diamond model [71] are not designed to represent the fundamental cyber-attack constructs.…”
Section: A Selection Of Amtmentioning
confidence: 99%
“…Attack scenario 1 ( Figure 1) and 2 ( Figure 2) were based on the fictional attack graphs produced by Barik and Mazumdar [47] and Ghosh and Ghosh [75] respectively. These scenarios were selected as they are published scenarios and have small visual structures in terms of the number of cyber-attack constructs being used.…”
Section: B Materialsmentioning
confidence: 99%
“…They also apply a restriction about the depth of the search, which limits the algorithm from identifying less possible attacks. In [31] an approach that is based on artificial intelli-gence with the name Planner is applied to generate the attack graph. Customized algorithms are used to generate attack paths in polynomial time.…”
Section: Attack Graph Generation and Analysismentioning
confidence: 99%
“…2. These graphs for the same enterprise network at different instant of time (for the sampling interval Dt) are generated using model checking-based tool called SGPlan [11,12]. Existing vulnerabilities in the test network are logically combined to generate different attack scenario, which in turn represents different attack paths.…”
Section: Case Studymentioning
confidence: 99%