With the convergence of IT and OT networks, more opportunities can be found to destroy physical processes by cyberattacks. Discovering attack paths plays a vital role in describing possible sequences of exploitation. Automated planning that is an important branch of artificial intelligence (AI) is introduced into the attack graph modeling. However, while adopting the modeling method for large-scale IT and OT networks, it is difficult to meet urgent demands, such as scattered data management, scalability, and automation. To that end, an automatic planning-based attack path discovery approach is proposed in this paper. At first, information of the attacking knowledge and network topology is formally represented in a standardized planning doma...
Includes bibliographical referencesWhile assessing security on single devices can be performed using...
For solving scalability problem of Network Attack Graph(NAG), this paper presents a new method for n...
Computer networks are ubiquitous and growing exponentially, with a predicted 50 billion devices conn...
Assessing network security is a complex and difficult task. Attack graphs have been proposed as a to...
Attack graph is a tool to analyze multi-stage, multi-host attack scenarios in a network. It is a com...
Assessing network security is a complex and difficult task. Attack graphs have been proposed as a to...
Based on the classical plan recognition methods in the domain of artificial intelligence, and consid...
National audienceWith the increase of attacks and Information Systems getting ever more complex, sec...
As penetration testing frameworks have evolved and have become more complex, the problem of controll...
With the rapid development of the Internet, network attacks often occur, and network security is wid...
To address the scalability problem in attack graphs generation, we propose a novel method to generat...
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible...
The last twenty-five years have seen an explosion in the number of networks in the world. With this ...
The ever-evolving capabilities of cyber attackers force security administrators to focus on the earl...
AbstractAn integral part of modeling the global view of network security is constructing attack grap...
Includes bibliographical referencesWhile assessing security on single devices can be performed using...
For solving scalability problem of Network Attack Graph(NAG), this paper presents a new method for n...
Computer networks are ubiquitous and growing exponentially, with a predicted 50 billion devices conn...
Assessing network security is a complex and difficult task. Attack graphs have been proposed as a to...
Attack graph is a tool to analyze multi-stage, multi-host attack scenarios in a network. It is a com...
Assessing network security is a complex and difficult task. Attack graphs have been proposed as a to...
Based on the classical plan recognition methods in the domain of artificial intelligence, and consid...
National audienceWith the increase of attacks and Information Systems getting ever more complex, sec...
As penetration testing frameworks have evolved and have become more complex, the problem of controll...
With the rapid development of the Internet, network attacks often occur, and network security is wid...
To address the scalability problem in attack graphs generation, we propose a novel method to generat...
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible...
The last twenty-five years have seen an explosion in the number of networks in the world. With this ...
The ever-evolving capabilities of cyber attackers force security administrators to focus on the earl...
AbstractAn integral part of modeling the global view of network security is constructing attack grap...
Includes bibliographical referencesWhile assessing security on single devices can be performed using...
For solving scalability problem of Network Attack Graph(NAG), this paper presents a new method for n...
Computer networks are ubiquitous and growing exponentially, with a predicted 50 billion devices conn...