2009 International Conference on Computational Science and Engineering 2009
DOI: 10.1109/cse.2009.233
|View full text |Cite
|
Sign up to set email alerts
|

Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
2

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 11 publications
0
14
0
2
Order By: Relevance
“…Prior work in this area similarly represents attacks as developing progressively. It is thus commonly based on attack trees or graphs, Markov processes, state space models, Bayesian networks, etc., (31,(71)(72)(73) in which the central feature is that being in one state gives access to another.…”
Section: The Attack Affordance Graphmentioning
confidence: 99%
“…Prior work in this area similarly represents attacks as developing progressively. It is thus commonly based on attack trees or graphs, Markov processes, state space models, Bayesian networks, etc., (31,(71)(72)(73) in which the central feature is that being in one state gives access to another.…”
Section: The Attack Affordance Graphmentioning
confidence: 99%
“…The semi-explicit correlation type generalizes the explicit method by introducing preconditions and postconditions for each step in the attack graph, instead of focusing on generating the whole attack graph [40]. The semi-explicit approach is flexible because only the elementary entities are defined and then the causal relationships between these elementary entities connect them [16]. Due to its flexibility, we will propose a semi-explicit method using preconditions and postconditions to model attacks.…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…The approach in this paper provides a solution to this problem using privileges, thus propagating impacts only when infected privileges enable such propagations. Pre-emptive response draws dependencies between elementary exploits [8,17] or vulnerabilities [3,7] rather than services. It provides techniques to evaluate attacker intentions and to adjust cost measures accordingly.…”
Section: Related Workmentioning
confidence: 99%
“…An intrusion impact covers the privileges realized on the target service and the services which use the target service. We note a main difference between the purpose of this paper, which is to evaluate the impact of elementary intrusions, and the prediction of attacker objectives as used in exploit graphs [8]. Exploit graphs often assign static damage costs to each elementary node within these graphs [17].…”
Section: Introductionmentioning
confidence: 99%