Attacker Profiling in Quantitative Security Assessment Based on Attack Trees.
Aleksandr LeninJan WillemsonDyan Permata SariPublished in: NordSec (2014)
Keyphrases
- defense mechanisms
- attack scenarios
- security measures
- attack graphs
- cyber attacks
- key exchange protocol
- security vulnerabilities
- countermeasures
- attack detection
- denial of service attacks
- fault injection
- attack graph
- ddos attacks
- alert correlation
- sql injection
- intrusion detection
- intrusion detection system
- information security
- computer security
- security policies
- cyber security
- risk assessment
- malicious users
- decision trees
- encryption algorithm
- security management
- security issues
- malicious attacks
- security requirements
- information leakage
- security threats
- authentication mechanism
- authentication protocol
- block cipher
- security analysis
- penetration testing
- statistical databases
- forensic analysis
- java card
- qualitative and quantitative
- access control