The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement.
Ross HorneSjouke MauwAlwen TiuPublished in: GraMSec@FLoC (2018)
Keyphrases
- attack graphs
- attack graph
- defense mechanisms
- attack scenarios
- decision trees
- sql injection attacks
- web applications
- countermeasures
- tree structure
- tree structures
- external information
- binary trees
- relational databases
- database
- internal and external
- detection mechanism
- denial of service attacks
- attack detection
- alert correlation
- sql injection