Abstract. The perspective directions in evaluating network security are simu-lating possible malefactor’s actions, building the representation of these actions as attack graphs (trees, nets), the subsequent checking of various properties of these graphs, and determining security metrics which can explain possible ways to increase security level. The paper suggests a new approach to security evaluation based on comprehensive simulation of malefactor’s actions, con-struction of attack graphs and computation of different security metrics. The approach is intended for using both at design and exploitation stages of com-puter networks. The implemented software system is described, and the exam-ples of experiments for analysis of network security...
AbstractAn integral part of modeling the global view of network security is constructing attack grap...
Assessing network security is a complex and difficult task. Attack graphs have been proposed as a to...
This paper presents a graph based approach to network vulnerability analysis. The method is flexible...
Abstract. The perspective directions in evaluating network security are simu-lating possible malefac...
The approach to network security analysis is suggested. It is based on simulation of malefactor’s be...
Abstract: The approach to computer network security analysis intended for using both at design and e...
With the development of computer networks, the attacks with respect to them are increasing explosive...
As an important method to analyze the security states of computer network, the generation of network...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
Abstract—Attack graphs play important roles in analyzing network security vulnerabilities, and previ...
This thesis research works on risk assessment of computer networks. Defining an attack model is norm...
We propose in this paper a novel approach to analyze network vulnerability and to obtain a quantitat...
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible...
With the rapid development of the Internet, network attacks often occur, and network security is wid...
Attack graphs play important roles in analyzing network security vulnerabilities, and previous works...
AbstractAn integral part of modeling the global view of network security is constructing attack grap...
Assessing network security is a complex and difficult task. Attack graphs have been proposed as a to...
This paper presents a graph based approach to network vulnerability analysis. The method is flexible...
Abstract. The perspective directions in evaluating network security are simu-lating possible malefac...
The approach to network security analysis is suggested. It is based on simulation of malefactor’s be...
Abstract: The approach to computer network security analysis intended for using both at design and e...
With the development of computer networks, the attacks with respect to them are increasing explosive...
As an important method to analyze the security states of computer network, the generation of network...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
Abstract—Attack graphs play important roles in analyzing network security vulnerabilities, and previ...
This thesis research works on risk assessment of computer networks. Defining an attack model is norm...
We propose in this paper a novel approach to analyze network vulnerability and to obtain a quantitat...
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible...
With the rapid development of the Internet, network attacks often occur, and network security is wid...
Attack graphs play important roles in analyzing network security vulnerabilities, and previous works...
AbstractAn integral part of modeling the global view of network security is constructing attack grap...
Assessing network security is a complex and difficult task. Attack graphs have been proposed as a to...
This paper presents a graph based approach to network vulnerability analysis. The method is flexible...