Abstract. We propose a novel approach to estimating the impact of an attack using a data model and an impact model on top of an attack graph. The data model describes how data flows between nodes in the network -how it is copied and processed by softwares and hosts -while the impact model models how exploitation of vulnerabilities affects the data flows with respect to the confidentiality, integrity and availability of the data. In addition, by assigning a loss value to a compromised data set, we can estimate the cost of a successful attack. We show that our algorithm not only subsumes the simple impact estimation used in the literature but also improves it by explicitly modeling loss value dependencies between network nodes. With our model...
Being a relatively new risk source, models to quantify cyber risks are not well developed; therefore...
Computer networks are certainly vulnerable as long as they deliver services from different machines....
Network services are becoming larger and increasingly complex to manage. It is extremely critical to...
We propose a novel approach to estimating the impact of an attack using a data model and an impact m...
We propose a novel approach to estimating the impact of an attack using a data model and an impact m...
We propose a novel approach for statistical risk modeling of network attacks that lets an operator p...
We propose a novel approach for statistical risk modeling of network attacks that lets an operator p...
We propose a novel approach for statistical risk modeling of network attacks that lets an operator p...
We propose a novel approach for statistical risk modeling of network attacks that lets an operator p...
We propose a novel approach for statistical risk modeling of network attacks that lets an operator p...
Abstract—Attack graph is a popular tool for modeling multi-staged, correlated attacks on computer ne...
An attack graph is an abstraction that represents the ways an attacker can violate a security policy...
Being a relatively new risk source, models to quantify cyber risks are not well developed; therefore...
Abstract—This contribution presents a graph based approach for modelling the effects of both attacks...
Computer networks are certainly vulnerable as long as they deliver services from different machines....
Being a relatively new risk source, models to quantify cyber risks are not well developed; therefore...
Computer networks are certainly vulnerable as long as they deliver services from different machines....
Network services are becoming larger and increasingly complex to manage. It is extremely critical to...
We propose a novel approach to estimating the impact of an attack using a data model and an impact m...
We propose a novel approach to estimating the impact of an attack using a data model and an impact m...
We propose a novel approach for statistical risk modeling of network attacks that lets an operator p...
We propose a novel approach for statistical risk modeling of network attacks that lets an operator p...
We propose a novel approach for statistical risk modeling of network attacks that lets an operator p...
We propose a novel approach for statistical risk modeling of network attacks that lets an operator p...
We propose a novel approach for statistical risk modeling of network attacks that lets an operator p...
Abstract—Attack graph is a popular tool for modeling multi-staged, correlated attacks on computer ne...
An attack graph is an abstraction that represents the ways an attacker can violate a security policy...
Being a relatively new risk source, models to quantify cyber risks are not well developed; therefore...
Abstract—This contribution presents a graph based approach for modelling the effects of both attacks...
Computer networks are certainly vulnerable as long as they deliver services from different machines....
Being a relatively new risk source, models to quantify cyber risks are not well developed; therefore...
Computer networks are certainly vulnerable as long as they deliver services from different machines....
Network services are becoming larger and increasingly complex to manage. It is extremely critical to...