DOI: 10.3990/1.9789036529235
|View full text |Cite
|
Sign up to set email alerts
|

finding multi-step attacks in computer networks using heuristic search and mobile ambients

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 130 publications
(287 reference statements)
0
2
0
Order By: Relevance
“…Finding steps of possible attacks turns out to be a rather challenging problem due to the complexity and size of networks, and the high number of possible combinations among steps which represent opportunities for potential attackers. To address the problem of proactively finding possible multi-step attacks in networks, Franqueira's thesis [7] contains the MsAMS (Multistep Attack Modeling and Simulation) solution: an approach that uses a variation of Mobile Ambients as modeling paradigm, and Heuristic Search as simulation paradigm, supported by Link Analysis Ranking algorithms as a source of metrics. As an evidence of feasibility of this approach in networks of realistic size, this thesis introduces the MsAMS proof-of-concept tool, and shows that this is scalable to realistic networks.…”
Section: Modeling Penetration Testingmentioning
confidence: 99%
“…Finding steps of possible attacks turns out to be a rather challenging problem due to the complexity and size of networks, and the high number of possible combinations among steps which represent opportunities for potential attackers. To address the problem of proactively finding possible multi-step attacks in networks, Franqueira's thesis [7] contains the MsAMS (Multistep Attack Modeling and Simulation) solution: an approach that uses a variation of Mobile Ambients as modeling paradigm, and Heuristic Search as simulation paradigm, supported by Link Analysis Ranking algorithms as a source of metrics. As an evidence of feasibility of this approach in networks of realistic size, this thesis introduces the MsAMS proof-of-concept tool, and shows that this is scalable to realistic networks.…”
Section: Modeling Penetration Testingmentioning
confidence: 99%
“…For instance, cell-to-switch assignment is developed using heuristic search for mobile calls in [17]. Heuristic search is further used in [18] to simulate possible attackers searching for attacks in modelled network for proactive and continuous identification of network attacks. Recursive Random Search (RRS) strategy is used in [19] to build an online simulation framework to aid generic large scale network protocol and parameter configuration.…”
Section: Motivationmentioning
confidence: 99%