Scalable Attack Path Finding for Increased Security.
Tom GondaRami PuzisBracha ShapiraPublished in: CSCML (2017)
Keyphrases
- path finding
- cyber attacks
- security measures
- security vulnerabilities
- key exchange protocol
- path planning
- information security
- countermeasures
- heuristic search
- search algorithm
- hill climbing
- intrusion detection
- authentication protocol
- access control
- network security
- optimal path
- dos attacks
- secret key
- encryption scheme
- encryption algorithm
- rule learning
- genetic algorithm
- fuzzy sets
- search space
- smart card