2010
DOI: 10.1007/978-3-642-11322-2_48
|View full text |Cite
|
Sign up to set email alerts
|

An ACO Based Approach for Detection of an Optimal Attack Path in a Dynamic Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…A methodology for creating dynamic environments whose vulnerability severity may vary over time has been presented in this work. An innovative method known as Ant Colony Optimization (ACO), which is based on a soft computing technology, has been introduced [16]. It takes an attack graph and the individual exploit scores to generate an ideal attack path dynamically [13].…”
Section: Intrusion Optimal Path Attack Detectionmentioning
confidence: 99%
“…A methodology for creating dynamic environments whose vulnerability severity may vary over time has been presented in this work. An innovative method known as Ant Colony Optimization (ACO), which is based on a soft computing technology, has been introduced [16]. It takes an attack graph and the individual exploit scores to generate an ideal attack path dynamically [13].…”
Section: Intrusion Optimal Path Attack Detectionmentioning
confidence: 99%
“…Secondly, this technique's performance is not good enough when it deals with APT and zero-day vulnerabilities, because the interval of time series of HMM is slight less than the interval of APT and this method uses Common Vulnerability and Exposures (CVE) [10]. Ghosh et al [4] proposes an ACO-based defense strategy planning method. This method is similar as [6].…”
Section: Related Workmentioning
confidence: 99%
“…Thus, the optimal attack path cannot be modeled quickly, and in extreme cases, it may not be possible to determine the optimal attack path. In [4], authors use the ant colony optimization (ACO) approach to search the optimal attack path based on the minimal attack path [5], but ACO can easily fall into a local optimum. Reference [6] proposes a HMMbased attack graph generation method, and then authors use ACO-based algorithm to compute the optimal attack path.…”
Section: Introductionmentioning
confidence: 99%
“…Such misinterpretations have been found to be very expensive in terms of both denial of service (DoS) and resource depletion (Thakar et al, 2010). To reduce the false alarms, alert correlation techniques (Cuppens and Miege, 2002;Ning et al, 2002) have been used to find which kind of attack actions may follow a given action (Ghosh et al, 2010;Debar and Wespi, 2001). But they could not tell the next likely action of the attacker.…”
Section: Introductionmentioning
confidence: 99%