Systematic literature review of security event correlation methods
Security event correlation approaches are necessary to detect and predict incremental
threats such as multi-step or targeted attacks (advanced persistent threats) and other causal …
threats such as multi-step or targeted attacks (advanced persistent threats) and other causal …
SoK: Contemporary issues and challenges to enable cyber situational awareness for network security
Cyber situational awareness is an essential part of cyber defense that allows the
cybersecurity operators to cope with the complexity of today's networks and threat …
cybersecurity operators to cope with the complexity of today's networks and threat …
Multi-stage attack graph security games: Heuristic strategies, with empirical game-theoretic analysis
We study the problem of allocating limited security countermeasures to protect network data
from cyber-attacks, for scenarios modeled by Bayesian attack graphs. We consider multi …
from cyber-attacks, for scenarios modeled by Bayesian attack graphs. We consider multi …
A framework for designing vulnerability metrics
Vulnerability analysis has long been used to evaluate the security posture of a system.
Different approaches, including vulnerability graphs and various vulnerability metrics, have …
Different approaches, including vulnerability graphs and various vulnerability metrics, have …
Security countermeasures selection using the meta attack language and probabilistic attack graphs
Connecting critical infrastructure assets to the network is absolutely essential for modern
industries. In contrast to the apparent advantages, network connectivity exposes other …
industries. In contrast to the apparent advantages, network connectivity exposes other …
An attack volume metric
For more than a decade, the notion of attack surface has been used to define the set of
vulnerable assets that an adversary may exploit to penetrate a system, and various metrics …
vulnerable assets that an adversary may exploit to penetrate a system, and various metrics …
System and method for constructing a graph-based model for optimizing the security posture of a composed internet of things system
Embodiments provide a system and method for constructing a graph-based model for
optimizing the security posture of a composed system. During operation, the system …
optimizing the security posture of a composed system. During operation, the system …
SCIBORG: Secure configurations for the IoT based on optimization and reasoning on graphs
Addressing security misconfiguration in complex distributed systems, such as networked
Industrial Control Systems (ICS) and Internet of Things (IoT) is challenging. Owners and …
Industrial Control Systems (ICS) and Internet of Things (IoT) is challenging. Owners and …
An experimental approach for estimating cyber risk: a proposal building upon cyber ranges and capture the flags
Current approaches to estimate the risk of compromise are based on either historical data or
pure technical assessments, such as the number and severity of vulnerabilities in the target …
pure technical assessments, such as the number and severity of vulnerabilities in the target …
Redundancy planning for cost efficient resilience to cyber attacks
J Soikkeli, G Casale… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We investigate the extent to which redundancy (including with diversity) can help mitigate
the impact of cyber attacks that aim to reduce system performance. Using analytical …
the impact of cyber attacks that aim to reduce system performance. Using analytical …