Evaluating Network Security With Two-Layer Attack Graphs.
Anmin XieZhuhua CaiCong TangJian-bin HuZhong ChenPublished in: ACSAC (2009)
Keyphrases
- network security
- attack graphs
- network administrators
- attack graph
- computer networks
- intrusion detection
- intrusion detection system
- traffic analysis
- information security
- network traffic
- risk assessment
- dos attacks
- attack scenarios
- security protection
- security management
- security vulnerabilities
- ip networks
- computer security
- security policies
- network monitoring
- anomaly detection
- lightweight
- anti phishing
- databases
- multistage
- real world