[go: up one dir, main page]

Jajodia et al., 2005 - Google Patents

Topological analysis of network attack vulnerability

Jajodia et al., 2005

View PDF
Document ID
3883330907961143721
Author
Jajodia S
Noel S
O’berry B
Publication year
Publication venue
Managing Cyber Threats: Issues, Approaches, and Challenges

External Links

Snippet

To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level vulnerabilities can be combined to achieve high-level attack goals. In this chapter, we …
Continue reading at csis.gmu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Similar Documents

Publication Publication Date Title
Jajodia et al. Topological analysis of network attack vulnerability
US7904962B1 (en) Network attack modeling, analysis, and response
US8997236B2 (en) System, method and computer readable medium for evaluating a security characteristic
Scott-Hayward et al. A survey of security in software defined networks
US7664845B2 (en) System and method for network vulnerability detection and reporting
Sheyner Scenario graphs and attack graphs
US8700767B2 (en) System and method for network vulnerability detection and reporting
US7243148B2 (en) System and method for network vulnerability detection and reporting
US20100058456A1 (en) IDS Sensor Placement Using Attack Graphs
Albanese et al. Deceiving attackers by creating a virtual attack surface
Johari et al. Penetration testing in IoT network
Garg et al. Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities
Gandikota et al. Web application security through comprehensive vulnerability assessment
Ebert et al. Penetration testing for automotive cybersecurity
Dacier Design of an intrusion-tolerant intrusion detection system
Grammatikakis et al. Attack graph generation
Helmer Intelligent multi-agent system for intrusion detection and countermeasures
Chen et al. An OVAL-based active vulnerability assessment system for enterprise computer networks
Qian et al. Designing scalable and effective decision support for mitigating attacks in large enterprise networks
Junges et al. Inferring Software Composition and Credentials of Embedded Devices from Partial Knowledge
Grande Security automation for web-based attacks
Huang et al. From Capabilities to Performance: Evaluating Key Functional Properties of LLM Architectures in Penetration Testing
Moon Practical Black-Box Analysis for Network Functions and Services
Baiardi Robust by design: Designing ICT infrastructures using Twins
Bui Combining Greenbone and Metasploit for enhanced penetration testing a lab-based evaluation