Optimal Network Security Hardening Using Attack Graph Games.
Karel DurkotaViliam LisýBranislav BosanskýChristopher KiekintveldPublished in: IJCAI (2015)
Keyphrases
- network security
- attack graph
- computer networks
- intrusion detection
- traffic analysis
- intrusion detection system
- network traffic
- dos attacks
- anomaly detection
- security policies
- security protection
- information security
- risk assessment
- attack graphs
- anti phishing
- neural network
- computer security
- situation assessment
- security management
- ip networks
- network administrators
- optimal strategy
- data mining
- databases