Attack Chains Construction Method Based on Vulnerabilities Combination

被引:0
|
作者
Zhao, Jing [1 ]
Sun, Hao [1 ]
Cheng, Yang [2 ]
机构
[1] College of Software, Dalian University of Technology, 321 Tuqiang Street, Dalian,116620, China
[2] College of Computer Science and Technology, Harbin Engineering University, 145 Nantong Street, Harbin,150001, China
来源
关键词
D O I
10.6633/IJNS.20220524(3).01
中图分类号
学科分类号
摘要
引用
收藏
页码:389 / 400
相关论文
共 50 条
  • [1] Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
    Wang W.
    Du X.
    Shan D.
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (01): : 1 - 17
  • [2] Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities
    Karabey, Bugra
    Baykal, Nazife
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (03) : 297 - 304
  • [3] Detecting Xebsite Vulnerabilities based on Markov Chains Theory
    Yassine, Ayachi
    Noureddine, Rahmoune
    Ettifouri, El Hassane
    Berrich, Jamal
    Toumi, Bouchentouf
    [J]. PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2016, : 697 - 700
  • [4] Attack Vulnerabilities Analysis of Elgamal Elliptical Curve Based Stegocrypt Using Attack Trees
    Rabbani, Saqfi Ahmad
    Rahardjo, Budi
    Wuryandari, Aciek Ida
    [J]. 2018 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY SYSTEMS AND INNOVATION (ICITSI), 2018, : 290 - 294
  • [5] Bayesian Network Construction and Simplified Inference Method Based on Causal Chains
    Ueda, Yohei
    Ide, Daisuke
    Kimura, Masaomi
    [J]. INTELLIGENT HUMAN SYSTEMS INTEGRATION, IHSI 2018, 2018, 722 : 438 - 443
  • [6] DoS attack template construction based on attack atomic
    Zhu, Ning
    Chen, Xing-Yuan
    Zhang, Yong-Fu
    Tang, Hui-Lin
    Xin, Si-Yuan
    [J]. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 142 - 150
  • [7] An attack detection method based on indicator-dependent model construction and monitoring
    Wang L.-M.
    Bu L.
    Ma L.-Z.
    Yu X.-F.
    Shen N.-G.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (06): : 2204 - 2233
  • [8] A distributed method for DDoS attack tree construction
    Zhai, Jiqiang
    Wang, Keqi
    [J]. Zhai, J. (zhaijiqiang@126.com), 1600, Advanced Institute of Convergence Information Technology, Myoungbo Bldg 3F,, Bumin-dong 1-ga, Seo-gu, Busan, 602-816, Korea, Republic of (04): : 538 - 545
  • [9] AN IMPROVED METHOD FOR THE COMBINATION OF MODIFIED INSULIN CHAINS
    GATTNER, HG
    KRAIL, G
    DANHO, W
    KNORR, R
    WIENEKE, HJ
    BULLESBACH, EE
    SCHARTMANN, B
    BRANDENBURG, D
    ZAHN, H
    [J]. HOPPE-SEYLERS ZEITSCHRIFT FUR PHYSIOLOGISCHE CHEMIE, 1981, 362 (08): : 1043 - 1049
  • [10] MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion
    Mao, Beifeng
    Liu, Jing
    Lai, Yingxu
    Sun, Motong
    [J]. COMPUTER NETWORKS, 2021, 198