This paper presents an evolutionary algorithm that learns attack scenarios, called attack specifications, from a network graph. This learning process aims to find attack specifications that minimise cost and maximise the value that an attacker gets from a successful attack. The attack specifications that the algorithm learns are represented using an approach based on Hoare's CSP (Communicating Sequential Processes). This new approach is able to represent several elements found in attacks, for example synchronisation. These attack specifications can be used by network administrators to find vulnerable scenarios, composed from the basic constructs Sequence, Parallel and Choice, that lead to valuable assets in the network
Understanding the strategies of attacks is crucial for security applications such as computer and n...
Despite a significant increase in security of modern information systems, cyber attacks have become ...
Abstract- How to find and detect novel o r unknown network attacks is one of the most important obje...
This paper presents an evolutionary algorithm that learns attack scenarios, called attack specificat...
This paper presents an evolutionary approach for learning attack specifications that describe attack...
Attack graphs are models that offer significant capabilities to analyse security in network systems....
In network security hardening a network administrator may need to use limited resources (such as hon...
Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desire...
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible...
This paper presents a graph based approach to network vulnerability analysis. The method is flexible...
To address the scalability problem in attack graphs generation, we propose a novel method to generat...
In this article, a modeling process is defined to address challenges in analyzing attack scenarios a...
With the rapid development of the Internet, network attacks often occur, and network security is wid...
Abstract. We propose and investigate a new concept for automatic search for attack strategies and de...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
Understanding the strategies of attacks is crucial for security applications such as computer and n...
Despite a significant increase in security of modern information systems, cyber attacks have become ...
Abstract- How to find and detect novel o r unknown network attacks is one of the most important obje...
This paper presents an evolutionary algorithm that learns attack scenarios, called attack specificat...
This paper presents an evolutionary approach for learning attack specifications that describe attack...
Attack graphs are models that offer significant capabilities to analyse security in network systems....
In network security hardening a network administrator may need to use limited resources (such as hon...
Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desire...
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible...
This paper presents a graph based approach to network vulnerability analysis. The method is flexible...
To address the scalability problem in attack graphs generation, we propose a novel method to generat...
In this article, a modeling process is defined to address challenges in analyzing attack scenarios a...
With the rapid development of the Internet, network attacks often occur, and network security is wid...
Abstract. We propose and investigate a new concept for automatic search for attack strategies and de...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
Understanding the strategies of attacks is crucial for security applications such as computer and n...
Despite a significant increase in security of modern information systems, cyber attacks have become ...
Abstract- How to find and detect novel o r unknown network attacks is one of the most important obje...