Login / Signup

Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts.

Lingyu WangAnyi LiuSushil Jajodia
Published in: Comput. Commun. (2006)
Keyphrases
  • alert correlation
  • attack graph
  • attack graphs
  • attack scenarios
  • intrusion detection system
  • intrusion detection
  • network configuration
  • attack detection
  • decision making
  • computer networks
  • security vulnerabilities