Proceedings of the 9th Annual Cyber and Information Security Research Conference on - CISR '14 2014
DOI: 10.1145/2602087.2602106
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid extensions for stateful attack graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…The term attack graph refers to a number of related techniques for security analysis, revolving around the use of a formal state space model in which state transitions represent the actions of an attacker or other force (Li et al, 2021) (Louthan et al, 2014) (Phillips & Swiler, 1998). Terminology related to attack graphs varies significantly across authors.…”
Section: Attack Graphsmentioning
confidence: 99%
See 2 more Smart Citations
“…The term attack graph refers to a number of related techniques for security analysis, revolving around the use of a formal state space model in which state transitions represent the actions of an attacker or other force (Li et al, 2021) (Louthan et al, 2014) (Phillips & Swiler, 1998). Terminology related to attack graphs varies significantly across authors.…”
Section: Attack Graphsmentioning
confidence: 99%
“…Attack graph analysis requires a state-transition model defining a state space and possible transitions between states. One approach used by researchers is to model each state as a collection of assets and facts, where facts may describe properties of individual assets or relationships among assets (Li et al, 2021) (Louthan et al, 2014). Transitions can be defined indirectly using exploit patterns with specified preconditions and postconditions, which may contain free variables that must be bound to assets to create a concrete transition.…”
Section: Attack Graphsmentioning
confidence: 99%
See 1 more Smart Citation
“…A Hybrid Attack Graph (HAG) was modeled by [32], using linguistics and type extensions of traditional attack graph given the necessary inputs of asset, topology, and fact declarations in the typed grammar. The HAG was illustrated through an example of an attacker who is trying to compromise an automotive car by forcing it to drivetoward a wall.…”
Section: Related Workmentioning
confidence: 99%
“…Louthan et al [10] describe an approach to modeling hybrid systems, such as programmed control systems and cyber physical systems, that interact with the physical world. Their method used what they term a hybrid attack graph.…”
Section: Attack Graph Modelsmentioning
confidence: 99%