2005
DOI: 10.1117/12.604240
|View full text |Cite
|
Sign up to set email alerts
|

Network vulnerability assessment using Bayesian networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
95
0
1

Year Published

2009
2009
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 118 publications
(96 citation statements)
references
References 0 publications
0
95
0
1
Order By: Relevance
“…It has been properly justified by Ammann et al in [1] and by Liu and Man in [17]. However, the state of the art solutions for Bayesian modelling of an attack graph, such as the ones of Liu and Man [17] and Poolsappasit et al [25], use this assumption to arbitrarily delete possible attack steps. In reality, in a single model containing all potential attacks, it is impossible to delete cycles without adding new nodes.…”
Section: Solution To the Cycle Problemmentioning
confidence: 99%
See 4 more Smart Citations
“…It has been properly justified by Ammann et al in [1] and by Liu and Man in [17]. However, the state of the art solutions for Bayesian modelling of an attack graph, such as the ones of Liu and Man [17] and Poolsappasit et al [25], use this assumption to arbitrarily delete possible attack steps. In reality, in a single model containing all potential attacks, it is impossible to delete cycles without adding new nodes.…”
Section: Solution To the Cycle Problemmentioning
confidence: 99%
“…Many people have proposed enhancements to improve attack graphs or trees with Bayesian networks, in order to use them for dynamic risk assessment [26,17,27]. However, they do not describe accurately how they address cycles that are inherent to attack graphs.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations