The ever-evolving capabilities of cyber attackers force security administrators to focus on the early identification of emerging threats. Targeted cyber attacks usually consist of several phases, from initial reconnaissance of the network environment to final impact on objectives. This paper investigates the identification of multi-step cyber threat scenarios using kill chain and attack graphs. Kill chain and attack graphs are threat modeling concepts that enable determining weak security defense points. We propose a novel kill chain attack graph that merges kill chain and attack graphs together. This approach determines possible chains of attacker’s actions and their materialization within the protected network. The graph generation uses a...
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible...
We perform a detailed survey and analysis of the most significant attacks, which have targeted indus...
The approach to network security analysis is suggested. It is based on simulation of malefactor’s be...
The ever-evolving capabilities of cyber attackers force security administrators to focus on the earl...
This repository contains supplementary materials for the following conference paper: Lukáš Sadlek, ...
Attack graphs have been used to model the vulnerabilities of the systems and their potential exploit...
Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desire...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
AbstractAn integral part of modeling the global view of network security is constructing attack grap...
National audienceWith the increase of attacks and Information Systems getting ever more complex, sec...
Abstract-A Network is a collection of many devices, where each node is said to be wired or wireless ...
Despite a significant increase in security of modern information systems, cyber attacks have become ...
This thesis research works on risk assessment of computer networks. Defining an attack model is norm...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
Network defense today is largely reactive rather than proactive, and lacks sufficient context for op...
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible...
We perform a detailed survey and analysis of the most significant attacks, which have targeted indus...
The approach to network security analysis is suggested. It is based on simulation of malefactor’s be...
The ever-evolving capabilities of cyber attackers force security administrators to focus on the earl...
This repository contains supplementary materials for the following conference paper: Lukáš Sadlek, ...
Attack graphs have been used to model the vulnerabilities of the systems and their potential exploit...
Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desire...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
AbstractAn integral part of modeling the global view of network security is constructing attack grap...
National audienceWith the increase of attacks and Information Systems getting ever more complex, sec...
Abstract-A Network is a collection of many devices, where each node is said to be wired or wireless ...
Despite a significant increase in security of modern information systems, cyber attacks have become ...
This thesis research works on risk assessment of computer networks. Defining an attack model is norm...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
Network defense today is largely reactive rather than proactive, and lacks sufficient context for op...
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible...
We perform a detailed survey and analysis of the most significant attacks, which have targeted indus...
The approach to network security analysis is suggested. It is based on simulation of malefactor’s be...