Security risk assessment based on bayesian multi-step attack graphs

被引:0
|
作者
Yang, Yunxue [1 ]
Jin, Shuyuan [1 ]
Fang, Binxing [1 ]
机构
[1] CAS Key Lab of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
来源
关键词
D O I
10.12733/jcis14098
中图分类号
学科分类号
摘要
引用
收藏
页码:3911 / 3918
相关论文
共 50 条
  • [41] Multi-Step Algorithm for Constructing Statistical Estimates Based on the Bayesian Approach in Measurement Problems
    R. Z. Khayrullin
    [J]. Measurement Techniques, 2022, 65 : 250 - 257
  • [42] Multi-Step Algorithm for Constructing Statistical Estimates Based on the Bayesian Approach in Measurement Problems
    Khayrullin, R. Z.
    [J]. MEASUREMENT TECHNIQUES, 2022, 65 (04) : 250 - 257
  • [43] Automatic Multi-Step Signature Derivation from Taint Graphs
    Ussath, Martin
    Cheng, Feng
    Meinel, Christoph
    [J]. PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
  • [44] Multi-Step Budgeted Bayesian Optimization with Unknown Evaluation Costs
    Astudillo, Raul
    Jiang, Daniel R.
    Balandat, Maximilian
    Bakshy, Eytan
    Frazier, Peter, I
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [45] Measuring Security Risk of Networks Using Attack Graphs
    Noel, Steven
    Jajodia, Sushil
    Wang, Lingyu
    Singhal, Anoop
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2010, 1 (01): : 113 - 123
  • [46] Privacy-preserving sequential step mining algorithm for multi-step attack correlation
    Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, School of Information Security Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    不详
    不详
    [J]. Qinghua Daxue Xuebao, 10 (1427-1434):
  • [47] RShield: A Refined Shield for Complex Multi-step Attack Detection Based on Temporal Graph Network
    Yang, Weiyong
    Gao, Peng
    Huang, Hao
    Wei, Xingshen
    Liu, Wei
    Zhu, Shishun
    Luo, Wang
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2022, PT III, 2022, : 468 - 480
  • [48] A multi-step key recovery attack on reduced round Salsa and ChaCha
    Garai, Hirendra Kumar
    Dey, Sabyasachi
    [J]. CRYPTOLOGIA, 2024,
  • [49] Introducing a New Alert Data Set for Multi-Step Attack Analysis
    Landauer, Max
    Skopik, Florian
    Wurzenberger, Markus
    [J]. PROCEEDINGS OF 17TH CYBER SECURITY EXPERIMENTATION AND TEST WORKSHOP, CSET 2024, 2024, : 32 - 44
  • [50] An Unsupervised Two-Layer Multi-Step Network Attack Detector
    Wang, Su
    Wang, Zhiliang
    Yin, Xia
    Shi, Xingang
    [J]. IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 1308 - 1309