Fast Network Attack Modeling and Security Evaluation based on Attack Graphs.
Igor V. KotenkoAndrey ChechulinPublished in: J. Cyber Secur. Mobil. (2014)
Keyphrases
- attack graphs
- attack graph
- attack scenarios
- security vulnerabilities
- network configuration
- attack detection
- alert correlation
- security measures
- network administrators
- information security
- network security
- cyber attacks
- access control
- security threats
- dos attacks
- countermeasures
- intrusion detection
- security mechanisms
- security requirements
- network management
- computer networks
- intrusion detection system
- computer systems