Articles with "attack graph" as a keyword



Photo from wikipedia

Scalable attack on graph data by injecting vicious nodes

Sign Up to like & get
recommendations!
Published in 2020 at "Data Mining and Knowledge Discovery"

DOI: 10.1007/s10618-020-00696-7

Abstract: Recent studies have shown that graph convolution networks (GCNs) are vulnerable to carefully designed attacks, which aim to cause misclassification of a specific node on the graph with unnoticeable perturbations. However, a vast majority of… read more here.

Keywords: attack; injecting vicious; attack graph; scalable attack ... See more keywords
Photo by goumbik from unsplash

A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3272053

Abstract: Vulnerability assessment in industrial IoT networks is critical due to the evolving nature of the domain and the increasing complexity of security threats. This study aims to address the existing gaps in the literature by… read more here.

Keywords: iot; vulnerability assessment; attack graph; attack ... See more keywords
Photo by goumbik from unsplash

Alert-Driven Attack Graph Generation Using S-PDFA

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3117348

Abstract: Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific to a network under observation. Such CTI currently requires extensive expert input for obtaining, assessing, and correlating system vulnerabilities into a graphical… read more here.

Keywords: attack graph; graph generation; generation using; driven attack ... See more keywords
Photo by goumbik from unsplash

Attack Graph-Based Moving Target Defense in Software-Defined Networks

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2020.2987085

Abstract: Moving target defense (MTD) has emerged as a proactive defense mechanism aiming to thwart a potential attacker. The key underlying idea of MTD is to increase uncertainty and confusion for attackers by changing the attack… read more here.

Keywords: mtd; attack graph; attack; defense ... See more keywords

A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Systems, Man, and Cybernetics: Systems"

DOI: 10.1109/tsmc.2019.2915940

Abstract: Securing cyber-physical systems (CPS) and Internet of Things (IoT) systems requires the identification of how interdependence among existing atomic vulnerabilities may be exploited by an adversary to stitch together an attack that can compromise the… read more here.

Keywords: attack graph; attack; scada networks; computer ... See more keywords
Photo from wikipedia

Vulnerability association evaluation of Internet of thing devices based on attack graph

Sign Up to like & get
recommendations!
Published in 2022 at "International Journal of Distributed Sensor Networks"

DOI: 10.1177/15501329221097817

Abstract: Device vulnerabilities emerge one after another in the Internet of thing environment, the attackers attack vulnerabilities on several low-level devices simultaneously by multi-step attack method to trigger the vulnerabilities on other high-level devices to damage… read more here.

Keywords: vulnerability; attack graph; device; internet thing ... See more keywords
Photo by goumbik from unsplash

A Network Intrusion Detection Method Incorporating Bayesian Attack Graph and Incremental Learning Part

Sign Up to like & get
recommendations!
Published in 2023 at "Future Internet"

DOI: 10.3390/fi15040128

Abstract: For the current stage of complex and changing network environments and correlated and synchronized vulnerability attacks, this study first fuses attack graph technology and Bayesian networks and constructs Bayesian attack graphs toportray the correlation relationships… read more here.

Keywords: detection method; attack graph; bayesian attack; network ... See more keywords