An attack graph is an abstraction that represents the ways an attacker can violate a security policy by leveraging interdependencies among discovered vulnerabilities. Attack graph analyses that extract security-relevant information from the attack graph are referred to as attack graph-based security metrics. Although a number of attack graph-based security metrics have been proposed in the literature, there has been no analysis of how these security metrics behave in response to security incidents. In this dissertation, we examine how attack graph-based security metrics behave in response to increased network vulnerabilities under heterogeneous network models. From this analysis, we identify opportunities for using equations that characteri...
The correct and efficient measurement of security properties is key to the deployment of effective c...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
To address the scalability problem in attack graphs generation, we propose a novel method to generat...
Abstract. To protect critical resources in today’s networked environments, it is desirable to quanti...
Abstract. To protect critical resources in today’s networked environments, it is desirable to quanti...
Abstract—Attack graphs play important roles in analyzing network security vulnerabilities, and previ...
Attack graphs play important roles in analyzing network security vulnerabilities, and previous works...
Abstract—Attack graph is a popular tool for modeling multi-staged, correlated attacks on computer ne...
Computer networks are certainly vulnerable as long as they deliver services from different machines....
Computer networks are certainly vulnerable as long as they deliver services from different machines....
As a model of vulnerability information, attack graphs have seen successes in many automated analyse...
Abstract—This contribution presents a graph based approach for modelling the effects of both attacks...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
It is difficult to assess the security of modern networks because they are usually dynamic with conf...
The correct and efficient measurement of security properties is key to the deployment of effective c...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
To address the scalability problem in attack graphs generation, we propose a novel method to generat...
Abstract. To protect critical resources in today’s networked environments, it is desirable to quanti...
Abstract. To protect critical resources in today’s networked environments, it is desirable to quanti...
Abstract—Attack graphs play important roles in analyzing network security vulnerabilities, and previ...
Attack graphs play important roles in analyzing network security vulnerabilities, and previous works...
Abstract—Attack graph is a popular tool for modeling multi-staged, correlated attacks on computer ne...
Computer networks are certainly vulnerable as long as they deliver services from different machines....
Computer networks are certainly vulnerable as long as they deliver services from different machines....
As a model of vulnerability information, attack graphs have seen successes in many automated analyse...
Abstract—This contribution presents a graph based approach for modelling the effects of both attacks...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
It is difficult to assess the security of modern networks because they are usually dynamic with conf...
The correct and efficient measurement of security properties is key to the deployment of effective c...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
To address the scalability problem in attack graphs generation, we propose a novel method to generat...