scholarly journals An Evolutionary Approach of Attack Graph to Attack Tree Conversion

Author(s):  
Md. Shariful Haque ◽  
◽  
Travis Atkison
Author(s):  
Kristian Beckers ◽  
Maritta Heisel ◽  
Leanid Krautsevich ◽  
Fabio Martinelli ◽  
Rene Meis ◽  
...  

2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Xiangwei Qi ◽  
Haifang Li ◽  
Bingcai Chen ◽  
Gulila Altenbek

Abstract With ever increasing complexity and intelligence of the modern cities, protecting key public facilities and important targets from any damage is a major challenge for the security sector. In all types of anti-terrorism prediction models, the prediction of attack behaviour is indispensable. Therefore, the attack behaviour model plays an important role in the anti-terrorism security system. This paper builds the attacker’s behaviour model, and carries out the prediction about the possible attack behaviour by the attacker model based on random strategy. According to the attack strategies, analysis and construction of the attack tree and attack graph are carried out based on the state-based stochastic model. The paper describes the security system in detail taking use of the state-based stochastic model method, so as to clarify the state distribution and the transfer relationship between the states of various security resources after threatened by attacks. At the same time, this paper applies the state-based stochastic model to establish the attacker model through the impact of attack on the security system.


2020 ◽  
Vol 35 ◽  
pp. 100219 ◽  
Author(s):  
Harjinder Singh Lallie ◽  
Kurt Debattista ◽  
Jay Bal

2018 ◽  
Vol 12 (3) ◽  
pp. 123-140
Author(s):  
B S Kiruthika Devi ◽  
T. Subbulakshmi ◽  
KV Mahesh Babu

This article describes how nowadays, attackers are targeting valuable assets and infrastructures in networked systems causing an impact on enterprises and individuals. By implementing moving target defenses helps to prevent cyber-attacks by changing the attack surface. Some security models like Attack Graph (A.G) and Attack Tree (A.T) provide a formal method to access and compare the effectiveness of them. So, in this article, the authors incorporate moving target defenses in a security model, using a Hierarchical Attack Representation Model (HARM), to compare and access the effectiveness of the security. In addition, the authors are also taking important measures (IMs) for implementing MTD techniques to enhance the scalability of the network. Finally, they compare the scalability of an attack graph and HARM models by implementing MTD techniques to find the effectiveness of security in network.


2019 ◽  
Vol 42 ◽  
Author(s):  
Marco Del Giudice

Abstract The argument against innatism at the heart of Cognitive Gadgets is provocative but premature, and is vitiated by dichotomous thinking, interpretive double standards, and evidence cherry-picking. I illustrate my criticism by addressing the heritability of imitation and mindreading, the relevance of twin studies, and the meaning of cross-cultural differences in theory of mind development. Reaching an integrative understanding of genetic inheritance, plasticity, and learning is a formidable task that demands a more nuanced evolutionary approach.


2010 ◽  
Vol 65 (1) ◽  
pp. 65-83 ◽  
Author(s):  
Bernadette Péley

A tanulmány amellett érvel, hogy az adaptív mechanizmusoknak és diszfunkcióiknak a finom elemzése jelentősen hozzájárul a fejlődés és a betegségek jobb megértéséhez, és a betegségek osztályozásának és a terápiáknak új útját nyithatja meg. Az evolúciós megközelítés a pszichoterápiába nem új elméletet vagy terápiás megközelítést kíván bevezetni, hanem az emberi természet törvényszerűségei mentén új megértési stratégiákat javasol. A patológiás szerveződést alapvetően az adaptivitás dimenziójában gondolja el. Ez kikényszeríti a fejlődési történet és a multikauzalitás szem előtt tartását. Hosszú távon ez a tüneti kategorizáción alapuló diagnosztika újragondolását is jelenti.


Author(s):  
Yanli Feng ◽  
Gongliang Sun ◽  
Zhiyao Liu ◽  
Chenrui Wu ◽  
Xiaoyang Zhu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document