2013
DOI: 10.1016/j.cose.2012.09.013
|View full text |Cite
|
Sign up to set email alerts
|

Exploring attack graph for cost-benefit security hardening: A probabilistic approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
72
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 93 publications
(74 citation statements)
references
References 22 publications
0
72
0
Order By: Relevance
“…In contrast, the security performance for joint surface with already deployed active countermeasures depends on their goodness. If a new countermeasure has less goodness compared to the one that has joint surface with it, it cannot increase the security performance and this surface is ignored, see (24). Thus, if a countermeasure has small disjoint surface coverage and small goodness, it cannot increase the total security performance.…”
Section: Security Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast, the security performance for joint surface with already deployed active countermeasures depends on their goodness. If a new countermeasure has less goodness compared to the one that has joint surface with it, it cannot increase the security performance and this surface is ignored, see (24). Thus, if a countermeasure has small disjoint surface coverage and small goodness, it cannot increase the total security performance.…”
Section: Security Performance Evaluationmentioning
confidence: 99%
“…For example, Balepin et al [6] propose to consider only availability loss of services affected by the intruder and countermeasure. Other models evaluate attack and countermeasure costs without putting them into the same measurement unit (e.g., [10], [20], [22]- [24]). These models define different parameters to calculate costs separately and then use several techniques to compare them.…”
Section: Related Workmentioning
confidence: 99%
“…Wang et al [6] propose a HMM-based attack graph generation method and ACO-based algorithm to evaluate the security of target network and plan corresponding countermeasures. This method can compute the transition probability between each two states.…”
Section: Related Workmentioning
confidence: 99%
“…In [4], authors use the ant colony optimization (ACO) approach to search the optimal attack path based on the minimal attack path [5], but ACO can easily fall into a local optimum. Reference [6] proposes a HMMbased attack graph generation method, and then authors use ACO-based algorithm to compute the optimal attack path. Based on this path, evaluating the security of target network can be evaluated and corresponding countermeasures can be planned.…”
Section: Introductionmentioning
confidence: 99%
“…Wang 33 , et al presented an approach which integrates attack graph and Hidden Markov model (HMM) together, for exploring the probabilistic relation between system observations and states. They have used a modified version of dependency attack graph to represent network assets and vulnerabilities.…”
Section: Attack Graph Based Security Metricsmentioning
confidence: 99%