2021 IEEE 34th Computer Security Foundations Symposium (CSF) 2021
DOI: 10.1109/csf51468.2021.00003
|View full text |Cite
|
Sign up to set email alerts
|

Heuristic Approach for Countermeasure Selection Using Attack Graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…The heuristic approach of countermeasure selection described in [37] uses the attack graph generation process of MuLVAL. The concept of pre-condition and post-condition used for attack steps are reused for mitigation actions, where post-conditions are the facts getting canceled by the implemented countermeasures.…”
Section: A Detailed Study Of Countermeasure Selection Methodologiesmentioning
confidence: 99%
See 3 more Smart Citations
“…The heuristic approach of countermeasure selection described in [37] uses the attack graph generation process of MuLVAL. The concept of pre-condition and post-condition used for attack steps are reused for mitigation actions, where post-conditions are the facts getting canceled by the implemented countermeasures.…”
Section: A Detailed Study Of Countermeasure Selection Methodologiesmentioning
confidence: 99%
“…Attack graphs are also being studied extensively and employed for the purpose of optimal selection of countermeasures, e.g., in [20], [29], [35], [37]. While the objects called attack graphs in [37] are essentially the same as the attack graphs of [1], and a reduced version of the latter, called vulnerability dependency graphs in [1] is used in [35], in each of the works [20], [29], [37] attack graphs are defined differently. Furthermore, each of them having different optimization goals, the optimization methods of [20], [29], [35], [37] require different input data.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Appana et al [80] proposed applying a ranking algorithm on the mission impact graph based on the MulVAL attack graph. Stan et al [85] proposed a method that expresses the risk of the system using an extended attack graph model that considers the prerequisites and consequences of exploiting a vulnerability, examines the attacker's potential lateral movements, and expresses the physical network topology as well as vulnerabilities in network protocols.…”
Section: Extension Findingsmentioning
confidence: 99%