scholarly journals A review of attack graph and attack tree visual syntax in cyber security

2020 ◽  
Vol 35 ◽  
pp. 100219 ◽  
Author(s):  
Harjinder Singh Lallie ◽  
Kurt Debattista ◽  
Jay Bal
Author(s):  
Kristian Beckers ◽  
Maritta Heisel ◽  
Leanid Krautsevich ◽  
Fabio Martinelli ◽  
Rene Meis ◽  
...  

2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Xiangwei Qi ◽  
Haifang Li ◽  
Bingcai Chen ◽  
Gulila Altenbek

Abstract With ever increasing complexity and intelligence of the modern cities, protecting key public facilities and important targets from any damage is a major challenge for the security sector. In all types of anti-terrorism prediction models, the prediction of attack behaviour is indispensable. Therefore, the attack behaviour model plays an important role in the anti-terrorism security system. This paper builds the attacker’s behaviour model, and carries out the prediction about the possible attack behaviour by the attacker model based on random strategy. According to the attack strategies, analysis and construction of the attack tree and attack graph are carried out based on the state-based stochastic model. The paper describes the security system in detail taking use of the state-based stochastic model method, so as to clarify the state distribution and the transfer relationship between the states of various security resources after threatened by attacks. At the same time, this paper applies the state-based stochastic model to establish the attacker model through the impact of attack on the security system.


Author(s):  
Gabriel Petrica ◽  
Sabina-Daniela Axinte ◽  
Ioan C. Bacivarov ◽  
Marian Firoiu ◽  
Ioan-Cosmin Mihai

2018 ◽  
Vol 12 (3) ◽  
pp. 123-140
Author(s):  
B S Kiruthika Devi ◽  
T. Subbulakshmi ◽  
KV Mahesh Babu

This article describes how nowadays, attackers are targeting valuable assets and infrastructures in networked systems causing an impact on enterprises and individuals. By implementing moving target defenses helps to prevent cyber-attacks by changing the attack surface. Some security models like Attack Graph (A.G) and Attack Tree (A.T) provide a formal method to access and compare the effectiveness of them. So, in this article, the authors incorporate moving target defenses in a security model, using a Hierarchical Attack Representation Model (HARM), to compare and access the effectiveness of the security. In addition, the authors are also taking important measures (IMs) for implementing MTD techniques to enhance the scalability of the network. Finally, they compare the scalability of an attack graph and HARM models by implementing MTD techniques to find the effectiveness of security in network.


2018 ◽  
Vol 79 ◽  
pp. 117-131 ◽  
Author(s):  
Harjinder Singh Lallie ◽  
Kurt Debattista ◽  
Jay Bal

2012 ◽  
Author(s):  
Michael McNeese ◽  
Nancy J. Cooke ◽  
Anita D'Amico ◽  
Mica R. Endsley ◽  
Cleotilde Gonzalez ◽  
...  
Keyword(s):  

CICTP 2017 ◽  
2018 ◽  
Author(s):  
Haojie Ji ◽  
Guizhen Yu ◽  
Yunpeng Wang ◽  
Zhao Zhang ◽  
Hongmao Qin

Sign in / Sign up

Export Citation Format

Share Document