Jajodia et al., 2005 - Google Patents
Topological analysis of network attack vulnerabilityJajodia et al., 2005
View PDF- Document ID
- 3883330907961143721
- Author
- Jajodia S
- Noel S
- O’berry B
- Publication year
- Publication venue
- Managing Cyber Threats: Issues, Approaches, and Challenges
External Links
Snippet
To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level vulnerabilities can be combined to achieve high-level attack goals. In this chapter, we …
- 238000010937 topological data analysis 0 title description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jajodia et al. | Topological analysis of network attack vulnerability | |
US7904962B1 (en) | Network attack modeling, analysis, and response | |
US8997236B2 (en) | System, method and computer readable medium for evaluating a security characteristic | |
Scott-Hayward et al. | A survey of security in software defined networks | |
US7664845B2 (en) | System and method for network vulnerability detection and reporting | |
Sheyner | Scenario graphs and attack graphs | |
US8700767B2 (en) | System and method for network vulnerability detection and reporting | |
US7243148B2 (en) | System and method for network vulnerability detection and reporting | |
US20100058456A1 (en) | IDS Sensor Placement Using Attack Graphs | |
Albanese et al. | Deceiving attackers by creating a virtual attack surface | |
Johari et al. | Penetration testing in IoT network | |
Garg et al. | Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities | |
Gandikota et al. | Web application security through comprehensive vulnerability assessment | |
Ebert et al. | Penetration testing for automotive cybersecurity | |
Dacier | Design of an intrusion-tolerant intrusion detection system | |
Grammatikakis et al. | Attack graph generation | |
Helmer | Intelligent multi-agent system for intrusion detection and countermeasures | |
Chen et al. | An OVAL-based active vulnerability assessment system for enterprise computer networks | |
Qian et al. | Designing scalable and effective decision support for mitigating attacks in large enterprise networks | |
Junges et al. | Inferring Software Composition and Credentials of Embedded Devices from Partial Knowledge | |
Grande | Security automation for web-based attacks | |
Huang et al. | From Capabilities to Performance: Evaluating Key Functional Properties of LLM Architectures in Penetration Testing | |
Moon | Practical Black-Box Analysis for Network Functions and Services | |
Baiardi | Robust by design: Designing ICT infrastructures using Twins | |
Bui | Combining Greenbone and Metasploit for enhanced penetration testing a lab-based evaluation |