Towards probabilistic identification of zero-day attack paths
暂无分享,去创建一个
John Yen | Xiaoyan Sun | Peng Liu | Anoop Singhal | Jun Dai | J. Yen | Peng Liu | A. Singhal | Xiaoyan Sun | Jun Dai
[1] Leyla Bilge,et al. Before we knew it: an empirical study of zero-day attacks in the real world , 2012, CCS.
[2] Sushil Jajodia,et al. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities , 2014, IEEE Transactions on Dependable and Secure Computing.
[3] Viktor K. Prasanna,et al. Scalable parallel implementation of exact inference in Bayesian networks , 2006, 12th International Conference on Parallel and Distributed Systems - (ICPADS'06).
[4] Robert E. Tarjan,et al. Depth-First Search and Linear Graph Algorithms , 1972, SIAM J. Comput..
[5] Samuel T. King,et al. Backtracking intrusions , 2003, SOSP '03.
[6] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[7] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[8] Andrew W. Appel,et al. MulVAL: A Logic-based Network Security Analyzer , 2005, USENIX Security Symposium.
[9] Sushil Jajodia,et al. An efficient approach to assessing the risk of zero-day vulnerabilities , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[10] Gary Carpenter. 동적 사용자를 위한 Scalable 인증 그룹 키 교환 프로토콜 , 2005 .
[11] Peng Liu,et al. Using Bayesian networks for cyber security analysis , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[12] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[13] Peng Ning,et al. Integrating IDS Alert Correlation and OS-Level Dependency Tracking , 2006, ISI.
[14] Ole J. Mengshoel,et al. Understanding the scalability of Bayesian network inference using clique tree growth curves , 2010, Artif. Intell..
[15] R. Sekar,et al. Dataflow anomaly detection , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[16] Adnan Darwiche,et al. Recursive conditioning , 2001, Artif. Intell..
[17] Xiaoqi Jia,et al. SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System , 2009, 2009 Annual Computer Security Applications Conference.
[18] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[19] Sushil Jajodia,et al. k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks , 2010, ESORICS.
[20] Xiaoyan Sun,et al. Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies , 2013, ESORICS.
[21] Christopher Krügel,et al. On the Detection of Anomalous System Call Arguments , 2003, ESORICS.
[22] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.
[23] Samuel T. King,et al. Enriching Intrusion Alerts Through Multi-Host Causality , 2005, NDSS.