2009 International Conference on Multimedia Information Networking and Security 2009
DOI: 10.1109/mines.2009.108
|View full text |Cite
|
Sign up to set email alerts
|

Recognizing Intrusive Intention and Assessing Threat Based on Attack Path Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…Attack intention is established when a potential attack is predicted, as mentioned by [12], and when the goal of an attacker is identified. Recently, cyber attacks have become more complicated, which makes determining the real intentions more difficult.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Attack intention is established when a potential attack is predicted, as mentioned by [12], and when the goal of an attacker is identified. Recently, cyber attacks have become more complicated, which makes determining the real intentions more difficult.…”
Section: Related Workmentioning
confidence: 99%
“…Technique that employed by [12] depends on determining the intention from the attack path. The researchers presented an attack path graph generation algorithm to propose a method for intrusive intention recognition.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The most common techniques for intrusion analysis depend on determining the features from the attack path as reported by [14][15][16][17][18]. The drawback of these techniques is that they are not suitable for large numbers of features.…”
Section: Introductionmentioning
confidence: 99%