A Generation Method of Network Security Hardening Strategy Based on Attack Graphs.
Chao ZhaoHuiqiang WangJunyu LinHongwu LvYushu ZhangPublished in: Int. J. Web Serv. Res. (2015)
Keyphrases
- network security
- generation method
- network administrators
- attack graphs
- intrusion detection
- computer networks
- traffic analysis
- intrusion detection system
- attack graph
- network traffic
- dos attacks
- security protection
- security policies
- anomaly detection
- risk assessment
- anti phishing
- ip networks
- security vulnerabilities
- information security
- security management
- data mining
- computer security
- attack scenarios
- object recognition
- situation assessment
- network management