International audienceWe propose a mitigation model that evaluates individual and combined countermeasures against multi-step cyber-attack scenarios. The goal is to anticipate the actions of an attacker that wants to disrupt a given system (e.g., an information system). The process is driven by an attack graph formalism, enforced with a stateful return on response investment metric that optimally evaluates, ranks and selects appropriate countermeasures to handle ongoing and potential attack
Abstract—This contribution presents a graph based approach for modelling the effects of both attacks...
The attack graph (AG) is an abstraction technique that reveals the ways an attacker can use to lever...
In this article, we present a mixed qualitative and quantitative approach for evaluation of informat...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
The losses arising from a system being hit by cyber attacks can be staggeringly high, but defending ...
An attack graph is an abstraction that represents the ways an attacker can violate a security policy...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
Research in information security has generally focused on providing a comprehensive interpretation o...
Network defense today is largely reactive rather than proactive, and lacks sufficient context for op...
Abstract: System incentive and alternation of attacker’s strategies are not taken into full conside...
In network security hardening a network administrator may need to use limited resources (such as hon...
We describe a model-based approach to select cost-effective countermeasures for an information and c...
Quantitative metrics can aid decision-makers in making informed trade-off decisions. In system-leve...
Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging ...
National audienceWith the increase of attacks and Information Systems getting ever more complex, sec...
Abstract—This contribution presents a graph based approach for modelling the effects of both attacks...
The attack graph (AG) is an abstraction technique that reveals the ways an attacker can use to lever...
In this article, we present a mixed qualitative and quantitative approach for evaluation of informat...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
The losses arising from a system being hit by cyber attacks can be staggeringly high, but defending ...
An attack graph is an abstraction that represents the ways an attacker can violate a security policy...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
Research in information security has generally focused on providing a comprehensive interpretation o...
Network defense today is largely reactive rather than proactive, and lacks sufficient context for op...
Abstract: System incentive and alternation of attacker’s strategies are not taken into full conside...
In network security hardening a network administrator may need to use limited resources (such as hon...
We describe a model-based approach to select cost-effective countermeasures for an information and c...
Quantitative metrics can aid decision-makers in making informed trade-off decisions. In system-leve...
Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging ...
National audienceWith the increase of attacks and Information Systems getting ever more complex, sec...
Abstract—This contribution presents a graph based approach for modelling the effects of both attacks...
The attack graph (AG) is an abstraction technique that reveals the ways an attacker can use to lever...
In this article, we present a mixed qualitative and quantitative approach for evaluation of informat...