2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec) 2015
DOI: 10.1109/cybersec.2015.30
|View full text |Cite
|
Sign up to set email alerts
|

Estimating Posterior Probabilities to Identify Breach Points during Cyber-attacks

Abstract: When a security incident is reported, identifying the point-of-breach is critical to figure out what an attacker might do next. Besides, the information related to the resources and levels of privilege acquired as a result of the breach, is essential to recreate the process. Such information is also crucial to planning a defense in real-time. To this end, we need to determine the following parameters associated with the system under attack, viz., a breach probability determined from the success of past cyber-a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 15 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?