Approach to attack path generation based on vulnerability correlation
暂无分享,去创建一个
[1] L J Busby,et al. Sex-role research on the mass media. , 1975, The Journal of communication.
[2] Hu Ming-zeng. Research on privilege-escalating based vulnerability taxonomy with multidimensional quantitative attribute , 2004 .
[3] Wang Guo-yu. Study of network security evaluation based on attack graph model , 2007 .
[4] Andrew W. Appel,et al. MulVAL: A Logic-based Network Security Analyzer , 2005, USENIX Security Symposium.
[5] Yi Zhang,et al. Two Formal Analysis of Attack Graphs: Two Formal Analysis of Attack Graphs , 2010 .
[6] Michael Lyle Artz,et al. NetSPA : a Network Security Planning Architecture , 2002 .
[7] Cynthia A. Phillips,et al. Computer-attack graph generation tool , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[8] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[9] John Hale,et al. A systematic approach to multi-stage network attack analysis , 2004, Second IEEE International Information Assurance Workshop, 2004. Proceedings..
[10] Ludovic Mé,et al. ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection , 2001, SEC.
[11] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[12] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[13] Lin Chuang,et al. Research on Model-Checking Based on Petri Nets , 2004 .
[14] Jeannette M. Wing,et al. Tools for Generating and Analyzing Attack Graphs , 2003, FMCO.
[15] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[16] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.