Proceedings of the 9th ACM Conference on Computer and Communications Security - CCS '02 2002
DOI: 10.1145/586139.586140
|View full text |Cite
|
Sign up to set email alerts
|

Scalable, graph-based network vulnerability analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
282
0
2

Year Published

2006
2006
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 324 publications
(284 citation statements)
references
References 0 publications
0
282
0
2
Order By: Relevance
“…Attack graph [1,2,4,10] and attack tree [8,9] representations have been proposed in network vulnerability management to demonstrate such causeconsequence relationships. The nodes in these data structures usually represent a certain network state of interest to an attacker, with edges connecting them to indicate the causeconsequence relationship.…”
Section: Attack Tree Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…Attack graph [1,2,4,10] and attack tree [8,9] representations have been proposed in network vulnerability management to demonstrate such causeconsequence relationships. The nodes in these data structures usually represent a certain network state of interest to an attacker, with edges connecting them to indicate the causeconsequence relationship.…”
Section: Attack Tree Modelmentioning
confidence: 99%
“…Although different attack scenarios are easily perceived in attack graphs, they can potentially suffer from a state space explosion problem. Ammann et al [1] identified this problem and propose an alternative formulation with the assumption of monotonicity. The monotonicity property states that the consequence of an attack is always preserved once achieved.…”
Section: Attack Tree Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, model checkers used for graph generation have state space explosion problem and do not handle a realistic set of exploits even for a moderate sized network. To improve the complexity of graph generation, some of the approaches [1,9,10] introduced an explicit assumption of monotonicity. This means once an attacker has gained certain level of privileges on a particular host, he does not have to regain them in the near future.…”
Section: Introductionmentioning
confidence: 99%