A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

A survey on the usability and practical applications of graphical security models

JB Hong, DS Kim, CJ Chung, D Huang - Computer Science Review, 2017 - Elsevier
This paper presents and discusses the current state of Graphical Security Models (GrSM), in
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …

Automated security risk identification using automationml-based engineering data

M Eckhart, A Ekelhart, E Weippl - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Systems integrators and vendors of industrial components need to establish a security-by-
design approach, which includes the assessment and subsequent treatment of security …

An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception

HS Lallie, K Debattista, J Bal - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Perceiving and understanding cyber-attacks can be a difficult task. This problem is widely
recognized and welldocumented, and more effective techniques are needed to aid cyber …

[HTML][HTML] Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies

M Barrère, C Hankin, N Nicolaou, DG Eliades… - Journal of information …, 2020 - Elsevier
Abstract In recent years, Industrial Control Systems (ICS) have become increasingly
exposed to a wide range of cyber-physical attacks, having massive destructive …

Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities

U Garg, G Sikka, LK Awasthi - Computers & Security, 2018 - Elsevier
The proliferated complexity of network size together with the expeditious development of
software applications and their numerous vulnerabilities, security hardening is becoming a …

Tracking the bad guys: An efficient forensic methodology to trace multi-step attacks using core attack graphs

M Barrère, RV Steiner, R Mohsen… - 2017 13th International …, 2017 - ieeexplore.ieee.org
In this paper, we describe an efficient methodology to guide investigators during network
forensic analysis. To this end, we introduce the concept of core attack graph, a compact …

An empirical test of the accuracy of an attack graph analysis tool

T Sommestad, F Sandström - Information & Computer Security, 2015 - emerald.com
Purpose–The purpose of this paper is to test the practical utility of attack graph analysis.
Attack graphs have been proposed as a viable solution to many problems in computer …

Attack graph generation, visualization and analysis: issues and challenges

GS Bopche, BM Mehtre - … , SSCC 2014, Delhi, India, September 24-27 …, 2014 - Springer
In the current scenario, even the well-administered enterprise networks are extremely
susceptible to sophisticated multi-stage cyber attacks. These attacks combine multiple …

Evaluating practitioner cyber-security attack graph configuration preferences

HS Lallie, K Debattista, J Bal - Computers & Security, 2018 - Elsevier
Attack graphs and attack trees are a popular method of mathematically and visually
representing the sequence of events that lead to a successful cyber-attack. Despite their …