48
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Use of Attack Graphs in Security Systems

      , ,
      Journal of Computer Networks and Communications
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

          Related collections

          Most cited references6

          • Record: found
          • Abstract: not found
          • Article: not found

          Dynamic Security Risk Management Using Bayesian Attack Graphs

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Aggregating vulnerability metrics in enterprise networks using attack graphs

                Bookmark

                Author and article information

                Journal
                Journal of Computer Networks and Communications
                Journal of Computer Networks and Communications
                Hindawi Limited
                2090-7141
                2090-715X
                2014
                2014
                : 2014
                :
                : 1-13
                Article
                10.1155/2014/818957
                a621f701-3a7a-46d7-a20f-38918300ce17
                © 2014

                http://creativecommons.org/licenses/by/3.0/

                History

                Comments

                Comment on this article