[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kotenko et al., 2015 - Google Patents

The CAPEC based generator of attack scenarios for network security evaluation

Kotenko et al., 2015

Document ID
12106208442339232243
Author
Kotenko I
Doynikova E
Publication year
Publication venue
2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)

External Links

Snippet

The paper proposes a technique and a software tool for generation of attack scenarios- random sequences of attack patterns and appropriate sequences of security events. The technique suggested is based on the application of open standards for representation of …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Kotenko et al. The CAPEC based generator of attack scenarios for network security evaluation
Xiong et al. Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix
Kotenko et al. A cyber attack modeling and impact assessment framework
Sommestad et al. The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures
Kotenko et al. Attack graph based evaluation of network security
Kotenko et al. Security analysis of information systems taking into account social engineering attacks
Dalton et al. Analyzing attack trees using generalized stochastic petri nets
Doynikova et al. CVSS-based probabilistic risk assessment for cyber situational awareness and countermeasure selection
Li et al. Security attack analysis using attack patterns
Kotenko et al. Attack Modelling and Security Evaluation for Security Information and Event Management.
Mirjalili et al. A survey on web penetration test
Frydman et al. Automating risk analysis of software design models
CN104881606B (en) Software security requirement acquisition method based on Formal Modeling
David et al. Modelling social-technical attacks with timed automata
Kotenko et al. NETWORK SECURITY EVALUATION BASED ON SIMULATION OF MALFACTOR’S BEHAVIOR
US11777979B2 (en) System and method to perform automated red teaming in an organizational network
Wolf et al. The PASTA threat model implementation in the IoT development life cycle
Alhassan et al. A fuzzy classifier-based penetration testing for web applications
Li et al. An approach to model network exploitations using exploitation graphs
Mauri et al. Stride-ai: An approach to identifying vulnerabilities of machine learning assets
Song et al. Generating fake cyber threat intelligence using the gpt-neo model
Kumar et al. A quantitative security risk analysis framework for modelling and analyzing advanced persistent threats
Rouached et al. An efficient formal framework for intrusion detection systems
Sheikh et al. A Hybrid Threat Assessment Model for Security of Cyber Physical Systems
Mohanty et al. Security Testing of Web Applications UsingThreat Modeling: A Systematic Review