Systematic literature review of security event correlation methods

I Kotenko, D Gaifulina, I Zelichenok - Ieee Access, 2022 - ieeexplore.ieee.org
Security event correlation approaches are necessary to detect and predict incremental
threats such as multi-step or targeted attacks (advanced persistent threats) and other causal …

SoK: Contemporary issues and challenges to enable cyber situational awareness for network security

M Husák, T Jirsík, SJ Yang - … of the 15th International Conference on …, 2020 - dl.acm.org
Cyber situational awareness is an essential part of cyber defense that allows the
cybersecurity operators to cope with the complexity of today's networks and threat …

Multi-stage attack graph security games: Heuristic strategies, with empirical game-theoretic analysis

TH Nguyen, M Wright, MP Wellman… - Proceedings of the 2017 …, 2017 - dl.acm.org
We study the problem of allocating limited security countermeasures to protect network data
from cyber-attacks, for scenarios modeled by Bayesian attack graphs. We consider multi …

A framework for designing vulnerability metrics

M Albanese, I Iganibo, O Adebiyi - Computers & Security, 2023 - Elsevier
Vulnerability analysis has long been used to evaluate the security posture of a system.
Different approaches, including vulnerability graphs and various vulnerability metrics, have …

Security countermeasures selection using the meta attack language and probabilistic attack graphs

W Wideł, P Mukherjee, M Ekstedt - IEEE Access, 2022 - ieeexplore.ieee.org
Connecting critical infrastructure assets to the network is absolutely essential for modern
industries. In contrast to the apparent advantages, network connectivity exposes other …

An attack volume metric

I Iganibo, M Albanese, M Mosko, E Bier… - Security and …, 2023 - Wiley Online Library
For more than a decade, the notion of attack surface has been used to define the set of
vulnerable assets that an adversary may exploit to penetrate a system, and various metrics …

System and method for constructing a graph-based model for optimizing the security posture of a composed internet of things system

H Soroush, MA Mehrabadi, S Rane… - US Patent …, 2024 - Google Patents
Embodiments provide a system and method for constructing a graph-based model for
optimizing the security posture of a composed system. During operation, the system …

SCIBORG: Secure configurations for the IoT based on optimization and reasoning on graphs

H Soroush, M Albanese, MA Mehrabadi… - … IEEE Conference on …, 2020 - ieeexplore.ieee.org
Addressing security misconfiguration in complex distributed systems, such as networked
Industrial Control Systems (ICS) and Internet of Things (IoT) is challenging. Owners and …

An experimental approach for estimating cyber risk: a proposal building upon cyber ranges and capture the flags

G Di Tizio, F Massacci, L Allodi… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Current approaches to estimate the risk of compromise are based on either historical data or
pure technical assessments, such as the number and severity of vulnerabilities in the target …

Redundancy planning for cost efficient resilience to cyber attacks

J Soikkeli, G Casale… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We investigate the extent to which redundancy (including with diversity) can help mitigate
the impact of cyber attacks that aim to reduce system performance. Using analytical …