This repository contains supplementary materials for the following conference paper: Lukáš Sadlek, Pavel Čeleda, and Daniel Tovarňák. Identification of Attack Paths Using Kill Chain and Attack Graphs. NOMS 2022 - 2022 IEEE/IFIP Network Operations and Management Symposium, 2022, pp. 1-6, doi: 10.1109/NOMS54207.2022.9789803. Content These supplementary materials contain a proof-of-concept implementation of a kill chain attack graph generator. The implemented approach uses the MulVAL attack graph generator to generate an attack graph based on organization's description and an example ruleset of MITRE ATT&CK techniques. The attack graph is further processed to determine kill chain phases of attack techniques, strategic attack techniques, and...
With the convergence of IT and OT networks, more opportunities can be found to destroy physical proc...
This thesis research works on risk assessment of computer networks. Defining an attack model is norm...
Assessing network security is a complex and difficult task. Attack graphs have been proposed as a to...
The ever-evolving capabilities of cyber attackers force security administrators to focus on the earl...
The development of technology in computer networks has increased the percentage of cyber-attacks and...
Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desire...
Attack graphs have been used to model the vulnerabilities of the systems and their potential exploit...
With the development of computer networks, the attacks with respect to them are increasing explosive...
AbstractAn integral part of modeling the global view of network security is constructing attack grap...
To address the scalability problem in attack graphs generation, we propose a novel method to generat...
National audienceWith the increase of attacks and Information Systems getting ever more complex, sec...
The attack graph (AG) is an abstraction technique that reveals the ways an attacker can use to lever...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
Attack graphs have been used to show multiple attack paths in large scale networks. They have been p...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
With the convergence of IT and OT networks, more opportunities can be found to destroy physical proc...
This thesis research works on risk assessment of computer networks. Defining an attack model is norm...
Assessing network security is a complex and difficult task. Attack graphs have been proposed as a to...
The ever-evolving capabilities of cyber attackers force security administrators to focus on the earl...
The development of technology in computer networks has increased the percentage of cyber-attacks and...
Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desire...
Attack graphs have been used to model the vulnerabilities of the systems and their potential exploit...
With the development of computer networks, the attacks with respect to them are increasing explosive...
AbstractAn integral part of modeling the global view of network security is constructing attack grap...
To address the scalability problem in attack graphs generation, we propose a novel method to generat...
National audienceWith the increase of attacks and Information Systems getting ever more complex, sec...
The attack graph (AG) is an abstraction technique that reveals the ways an attacker can use to lever...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
Attack graphs have been used to show multiple attack paths in large scale networks. They have been p...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
With the convergence of IT and OT networks, more opportunities can be found to destroy physical proc...
This thesis research works on risk assessment of computer networks. Defining an attack model is norm...
Assessing network security is a complex and difficult task. Attack graphs have been proposed as a to...