Have a personal or library account? Click to login
Network Threat Identification and Analysis Based on a State Transition Graph Cover

Network Threat Identification and Analysis Based on a State Transition Graph

By: Huiying Lv,  Yuan Zhang and  Jie Wang  
Open Access
|Dec 2013

References

  1. 1. Clarke, E. M., E. A. Emerson. Design and Synthesis of Synchronization Skeletons Using Branching Time Temporal Logic. - In: Proceedings of Logic of Programs, Vol. 131 of Lecture Notes in Computer Science, Workshop, Yorktown Heights, New York, 1981, 52-71.10.1007/BFb0025774
  2. 2. Cuppens, F., F. Autrel, A. Miege, S. Benferhat. Recognizing Malicious Intention in an Intrusion Detection Process. - In: Second International Conference on Hybrid Intelligent Systems. Santiago, 2002.
  3. 3. Huiying, Lv, R. Wang. Identifying Attacking Process Based on Attack State Transition Graph. - In: 3rd International Conference on Computer and Network Technology (ICCNT’2011), Tai Yuan, China, Vol. 4, 26-28 February 2011, 395-400.
  4. 4. Williams, L., R. Lippmann, K. Ingols. GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. - In: Viz Sec’2008, LNCS 5210, 2008, 44-59.
  5. 5. Ning, P., D. Xu. Learning Attack Strategies from Intrusion Alerts. - In: Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2003, 200-209.10.1145/948109.948137
  6. 6. Sheyne r, O., J. Haines, S. Jh a, R. Lippmann, J. M. Wing. Automated Generation and Analysis of Attack Graphs. - In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Oakland, CA, 2002, 273-284.
  7. 7. Lippmann, R., K. Ingols, C. Scottet al. Validating and Restoring Defence in Depth Using Attack Graphs. - In: Military Communications Conference, Washington, DC, USA, 2006.10.1109/MILCOM.2006.302434
  8. 8. Noel, S., S. Jajodi a. Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. - In: Proceedings of the 21st Annual Computer Security Applications Conference, Tucson, AZ, 2005, 160-169.
  9. 9. Martel, S. A New Model for Computer Network Security Risk Analysis. Ph D Paper, Department of System Computer Engineering, Carleton University, Ottawa, Ontario, May 2002.
  10. 10. Wang, C., G. Huan g. Network Threat Analysis Based on Vulnerability Relation Model. - Journal of Computer Applications, Vol. 30, 2010, No 11, 3046-3050.10.3724/SP.J.1087.2010.03046
  11. 11. Chen, Y., B. Boeh m, L. Sheppard. Value Driven Security Threat Modelling Based on Attack Path Analysis. - In: 40th Hawaii International Conference on System Sciences, 2007, 280-288.10.1109/HICSS.2007.601
  12. 12. Yureik, W., C. Abad. UCLog+: A Security Situational Identification System for Incident Storage, Querying, and Correlation. - In: Proceedings of the 14th International Conference on Telecommunication Systems Modelling and Analysis (ICTSM), 2006, 316-322.
DOI: https://doi.org/10.2478/cait-2013-0037 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 51 - 61
Published on: Dec 31, 2013
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2013 Huiying Lv, Yuan Zhang, Jie Wang, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons License.