A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020‏ - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014‏ - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

A taxonomy for attack graph generation and usage in network security

K Kaynar - Journal of Information Security and Applications, 2016‏ - Elsevier
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …

[PDF][PDF] AVOIDIT: A cyber attack taxonomy

C Simmons, C Ellis, S Shiva… - University of Memphis …, 2009‏ - researchgate.net
Cyber attacks have greatly increased over the years, where the attackers have progressively
improved in devising attacks towards a specific target. To aid in identifying and defending …

k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities

L Wang, S Jajodia, A Singhal… - IEEE Transactions on …, 2013‏ - ieeexplore.ieee.org
By enabling a direct comparison of different security solutions with respect to their relative
effectiveness, a network security metric may provide quantifiable evidences to assist security …

{MPI}: Multiple perspective attack investigation with semantic aware execution partitioning

S Ma, J Zhai, F Wang, KH Lee, X Zhang… - 26th USENIX Security …, 2017‏ - usenix.org
Traditional auditing techniques generate large and inaccurate causal graphs. To overcome
such limitations, researchers proposed to leverage execution partitioning to improve …

Attack graph analysis: An explanatory guide

K Zenitani - Computers & Security, 2023‏ - Elsevier
Attack graph analysis is a model-based approach for network-security analysis. It analyzes a
directed graph called an attack graph. Usually, each node in it corresponds to a malicious …

Aggregating vulnerability metrics in enterprise networks using attack graphs

J Homer, S Zhang, X Ou, D Schmidt… - Journal of …, 2013‏ - journals.sagepub.com
Quantifying security risk is an important and yet difficult task in enterprise network security
management. While metrics exist for individual software vulnerabilities, there is currently no …

Identifying critical attack assets in dependency attack graphs

RE Sawilla, X Ou - Computer Security-ESORICS 2008: 13th European …, 2008‏ - Springer
Attack graphs have been proposed as useful tools for analyzing security vulnerabilities in
network systems. Even when they are produced efficiently, the size and complexity of attack …

Model-based quantitative network security metrics: A survey

A Ramos, M Lazar, R Holanda Filho… - … Surveys & Tutorials, 2017‏ - ieeexplore.ieee.org
Network security metrics (NSMs) based on models allow to quantitatively evaluate the
overall resilience of networked systems against attacks. For that reason, such metrics are of …