2015
DOI: 10.5121/ijcnc.2015.7101
|View full text |Cite
|
Sign up to set email alerts
|

A Predictive Framework For Cyber Security Analytics Using Attack Graphs

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 48 publications
(32 citation statements)
references
References 34 publications
0
29
0
Order By: Relevance
“…Abraham et al [19] analyzed that the occurrence probability of path length can change over time with respect to the age of vulnerabilities. Ghanshyam et al [20] proposed graph distance metrics for assessing temporal changes in attack surface of dynamic networks, which can be used to identify most critical hosts in the network as per their locations.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Abraham et al [19] analyzed that the occurrence probability of path length can change over time with respect to the age of vulnerabilities. Ghanshyam et al [20] proposed graph distance metrics for assessing temporal changes in attack surface of dynamic networks, which can be used to identify most critical hosts in the network as per their locations.…”
Section: Related Workmentioning
confidence: 99%
“…In other words, we assign the weight of the edge based on the number of frequencies of the transition from an alert to another. For each row of P, we divide each element of the row by the sum of the rows to obtain the corresponding probability distribution in line (19). Since each cluster is independent, therefore Algorithm 2 is able to use real-time parallel processing technology to deal with each class cluster as well as the collection of transition probability matrix.…”
Section: Definition 2 a Markov Chainmentioning
confidence: 99%
“…In [34,35], the authors established the cyber-security analytics framework where we have captured all the processes involved in building our security metric framework. In [36,37] the extended the model to factor in the age of the vulnerabilities that are part of the generated Attack Tree. In this paper we will extend the model further by tying together the vulnerability discovery rate of all the software systems that are part of the enterprise network and analyze how the individual exploitability metrics evolve with time.…”
Section: Predictive Cyber Security Frameworkmentioning
confidence: 99%
“…-Attack and defense graphs. One of the main ways of providing risk assessment is supporting the implementation of attack and defense graphs [4]. With them, the dynamic risk management systems pretend to estimate the level of risk of the assets through the definition of attack patterns to capture dynamics of a threat and stages it has to go through.…”
Section: Introductionmentioning
confidence: 99%
“…Both attack and defense graphs have captured the attention of many researchers and security experts worldwide. Yet, their notable complexity and modest scalability are still refraining their wide acceptance and deployment [4]. Next we introduce some research challenges regarding attack and defense graphs.…”
Section: Introductionmentioning
confidence: 99%