Security risk assessment based on bayesian multi-step attack graphs

被引:0
|
作者
Yang, Yunxue [1 ]
Jin, Shuyuan [1 ]
Fang, Binxing [1 ]
机构
[1] CAS Key Lab of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
来源
关键词
D O I
10.12733/jcis14098
中图分类号
学科分类号
摘要
引用
收藏
页码:3911 / 3918
相关论文
共 50 条
  • [1] Information security assessment of wireless sensor networks based on Bayesian attack graphs
    Chen, You Ying
    Xu, Bing
    Long, Jun
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 41 (03) : 4511 - 4517
  • [2] Dynamic Security Risk Management Using Bayesian Attack Graphs
    Poolsappasit, Nayot
    Dewri, Rinku
    Ray, Indrajit
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (01) : 61 - 74
  • [3] Detection algorithm for multi-step attack based on CTPN
    Yan, Fen
    Huang, Hao
    Yin, Xin-Chun
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1383 - 1391
  • [4] Multi-step attack threat recognition algorithm based on attribute association in internet of things security
    Ding, Zhenguo
    Wang, Yuejin
    [J]. WIRELESS NETWORKS, 2024, 30 (05) : 4275 - 4286
  • [5] Real-Time Risk Assessment of Network Security Based on Attack Graphs
    Yin, Xiaochuan
    Fang, Yan
    Liu, Yibo
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMPUTER APPLICATIONS (ICSA 2013), 2013, 92 : 75 - 80
  • [6] Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling
    Liu, Zhijie
    Wang, Chongjun
    Chen, Shifu
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 214 - +
  • [7] An Attack Graph-based On-line Multi-step Attack Detector
    Angelini, Marco
    Bonomi, Silvia
    Borzi, Emanuele
    Del Pozzo, Antonella
    Lenti, Simone
    Santucci, Giuseppe
    [J]. ICDCN'18: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2018,
  • [8] Exploring Attack Graphs for Security Risk Assessment: A Probabilistic Approach
    GAO Ni
    HE Yiyue
    [J]. Wuhan University Journal of Natural Sciences, 2018, 23 (02) : 171 - 177
  • [9] Security Assessment of Computer Networks Based on Attack Graphs and Security Events
    Kotenko, Igor
    Doynikova, Elena
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 462 - 471
  • [10] A systematic survey on multi-step attack detection
    Navarro, Julio
    Deruyver, Aline
    Parrend, Pierre
    [J]. COMPUTERS & SECURITY, 2018, 76 : 214 - 249