Toward proactive, adaptive defense: A survey on moving target defense
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …
efforts to secure a system or network for the last several decades. However, the nature of …
A review of attack graph and attack tree visual syntax in cyber security
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix
Enterprise systems are growing in complexity, and the adoption of cloud and mobile
services has greatly increased the attack surface. To proactively address these security …
services has greatly increased the attack surface. To proactively address these security …
DAG-based attack and defense modeling: Don't miss the forest for the attack trees
B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …
OpenFlow: A security analysis
Software Defined Networking (SDN) has been proposed as a drastic shift in the networking
paradigm, by decoupling network control from the data plane and making the switching …
paradigm, by decoupling network control from the data plane and making the switching …
A review of threat modelling approaches for APT-style attacks
Threats are potential events, intentional or not, that compromise the confidentiality, integrity,
and/or availability of information systems. Defending against threats and attacks requires …
and/or availability of information systems. Defending against threats and attacks requires …
A framework for automating security analysis of the internet of things
Abstract The Internet of Things (IoT) is enabling innovative applications in various domains.
Due to its heterogeneous and wide-scale structure, it introduces many new security issues …
Due to its heterogeneous and wide-scale structure, it introduces many new security issues …
Foundations of attack–defense trees
We introduce and give formal definitions of attack–defense trees. We argue that these trees
are a simple, yet powerful tool to analyze complex security and privacy problems. Our …
are a simple, yet powerful tool to analyze complex security and privacy problems. Our …
Traceability in supply chains: A Cyber security analysis
Digital technologies are increasingly being adopted in modern supply chains for product
traceability, enabling data sharing amongst trading partners, quick availability of product …
traceability, enabling data sharing amongst trading partners, quick availability of product …
Attack–defense trees
Attack–defense trees are a novel methodology for graphical security modelling and
assessment. They extend the well-known formalism of attack trees by allowing nodes that …
assessment. They extend the well-known formalism of attack trees by allowing nodes that …