2018
DOI: 10.1109/tifs.2017.2771238
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 50 publications
(29 citation statements)
references
References 73 publications
0
29
0
Order By: Relevance
“…Current attack modeling techniques (e.g., attack graphs [21]) focus on representing and analyzing how a traditional cyber attack (e.g., denial of service) can occur. As these techniques do not account for the interactions between cyber and physical components, they may not be suitable to represent and analyze cyber-physical incidents [22].…”
Section: Related Workmentioning
confidence: 99%
“…Current attack modeling techniques (e.g., attack graphs [21]) focus on representing and analyzing how a traditional cyber attack (e.g., denial of service) can occur. As these techniques do not account for the interactions between cyber and physical components, they may not be suitable to represent and analyze cyber-physical incidents [22].…”
Section: Related Workmentioning
confidence: 99%
“…The AT was first proposed by Schneier [16]. In the structure of an AT, the root node represents the target of the attack [17]. The characteristics of system security are described on the basis of the AT.…”
Section: Das At Modelmentioning
confidence: 99%
“…Current Attack Modeling Techniques (e.g., attack graphs [7]) focus on representing how a traditional cyber-attack (e.g., denial of service attack) can occur. Resources available are also focusing on sharing information about cyber attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Although commonalities between these incidents can be observed, these have not been captured and used systematically to enhance security and support incident investigations [6]. Current attack modeling techniques (e.g., attack graphs [7]) focus on representing how a traditional cyber attack (e.g., denial of service) can occur. As these techniques do not account for the interactions between cyber and physical components, they are not suitable to represent cyber-physical incidents [8].…”
Section: Introductionmentioning
confidence: 99%