An Approach for Security Assessment of Network Configurations Using Attack Graph.
Nirnay GhoshSoumya K. GhoshPublished in: NetCoM (2009)
Keyphrases
- enterprise network
- attack graph
- attack graphs
- network configuration
- security issues
- alert correlation
- network management
- access control
- cyber attacks
- network monitoring
- security threats
- computer networks
- attack scenarios
- network traffic
- network administrators
- neural network
- network security
- security requirements
- sensitive data
- security measures
- information security
- intrusion detection