Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes

被引:0
|
作者
Levner, Eugene [1 ]
Tsadikovich, Dmitry [2 ]
机构
[1] Faculty of Sciences, Holon Institute of Technology, Holon,58102, Israel
[2] Department of Management, Bar Ilan University, Ramat Gan,5290002, Israel
关键词
Consensus algorithm - Graph algorithms - Optimization algorithms;
D O I
10.3390/a17110504
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception
    Lallie, Harjinder Singh
    Debattista, Kurt
    Bal, Jay
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) : 1110 - 1122
  • [2] Cyber-Attack Attributes
    Kadivar, Mehdi
    [J]. TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2014, : 22 - 27
  • [3] The Law of Cyber-Attack
    Hathaway, Oona A.
    Crootof, Rebecca
    Levitz, Philip
    Nix, Haley
    Nowlan, Aileen
    Perdue, William
    Spiegel, Julia
    [J]. CALIFORNIA LAW REVIEW, 2012, 100 (04) : 817 - 885
  • [4] Cyber-attack group analysis method based on association of cyber-attack information
    Son, Kyung-ho
    Kim, Byung-ik
    Lee, Tae-jin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280
  • [5] From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
    Polatidis, Nikolaos
    Pimenidis, Elias
    Pavlidis, Michalis
    Papastergiou, Spyridon
    Mouratidis, Haralambos
    [J]. EVOLVING SYSTEMS, 2020, 11 (03) : 479 - 490
  • [6] Understanding of Cyber-Attack Vulnerabilities During Natural Disasters and Discussing A Cyber-Attack Resiliency Framework
    Chakraborty, Suryadip
    Mombeshora, Elton M.
    Clark, Kyra P.
    Mbavarira, Tanaka S.
    [J]. SOUTHEASTCON 2024, 2024, : 466 - 471
  • [7] From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
    Nikolaos Polatidis
    Elias Pimenidis
    Michalis Pavlidis
    Spyridon Papastergiou
    Haralambos Mouratidis
    [J]. Evolving Systems, 2020, 11 : 479 - 490
  • [8] A Flow Attack Strategy based on Critical Links for Cyber-attack
    Qi, Jiming
    Zhang, Jiazheng
    Liu, Qingxia
    Wang, Bang
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 913 - 920
  • [9] Attack Analysis Framework for Cyber-Attack and Defense Test Platform
    Qi, Yulu
    Jiang, Rong
    Jia, Yan
    Li, Aiping
    [J]. ELECTRONICS, 2020, 9 (09) : 1 - 18
  • [10] Optimal Linear Cyber-Attack on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 4 - 13