2018
DOI: 10.1007/978-3-030-03026-1_3
|View full text |Cite
|
Sign up to set email alerts
|

An Attack Graph Generation Method Based on Parallel Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Compared to the serial approaches mentioned above, another attack graph generation has a dependence on parallel computing [21][22][23]. Its core idea is using a partition algorithm to split a large-scale complex network topology and processing each subgraph by multiple agents at the same time, which emphasizes the load balancing to enhance the efficiency of the attack graph generation.…”
Section: Related Workmentioning
confidence: 99%
“…Compared to the serial approaches mentioned above, another attack graph generation has a dependence on parallel computing [21][22][23]. Its core idea is using a partition algorithm to split a large-scale complex network topology and processing each subgraph by multiple agents at the same time, which emphasizes the load balancing to enhance the efficiency of the attack graph generation.…”
Section: Related Workmentioning
confidence: 99%
“…Attack graphs (developed through several years, notably in [16]- [18]) are merely used to represent the flow of an attack. The benefit of using attack graphs to describe an attack flow is to exploit the existing literature on digraphs (see [2]- [4], [19], [20]). Attack graphs can quantitatively model a probabilistic view of attacker capabilities (defined as Bayesian attack graphs [21]).…”
Section: Related Workmentioning
confidence: 99%