- 1.Burch, C., Krumke, S., Marathe, M., Phillips C., and Sundberg, E. "Multicriteria Approximation Through Decomposition", submitted, 1998.Google Scholar
- 2.Cherkassky, B.V., A.V. Goldberg, and T. Radzik. "Shortest Paths Algorithms: Theory and Experimental Evaluation," Math Programming, 73, pp.129--174, 1996. Web site: http://www.neci .nj .nec.com/homepages/avg/soft/so ft.html Google ScholarDigital Library
- 3.Dacier, M., Y. Deswarte, and M. Kaaniche. "Quantitative Assessment of Operational Security: Models and Tools." LAAS Research Report 96493, May 1996.Google Scholar
- 4.Denning, D. E. "An Intrusion-Detection Model." IEEE Transactions on Software Engineering, 13(2), 1987. Google ScholarDigital Library
- 5.Garey, M. R. and D. S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, W. H. Freeman and Company, NY, 1979. Google ScholarDigital Library
- 6.Howard, J. D. "An Analysis of Security Incidents on the Internet, 1989-1995." Doctoral dissertation, Carnegie Mellon University, 1997. Google ScholarDigital Library
- 7.Internet Security Systems, Inc. 41 Perimeter Center East, Suite 550, Atlanta, GA 30346. Creator of the X-force database, accessed via http://www.iss.net/xforce.Google Scholar
- 8.Lundqvist, U. and E. Jonsson. "A Map of Security Risks associated with using COTS." Computer, 31(6): 60-66, 1998. Google ScholarDigital Library
- 9.Lunt, T. F. "A Survey of Intrusion Detection Techniques." Computers and Security 12, pp. 405-418, 1993. Google ScholarDigital Library
- 10.Meadows, C., "A representation of Protocol Attacks for Risk Assessment", Network Threats, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Vol. 38, R. N. Wright and P.G. Neumann editors, American Mathematical Society, pp. 1-10.Google Scholar
- 11.Moskowithz, I.S, and M. H. Kang, "An Insecurity Flow Model", Proceedings of the Sixth New Security Paradigms Workshop", Langdale, Cumbria, UK, September, 1997, pp. 61-74. Google ScholarDigital Library
- 12.Naor, D. and D. Brutlag, "On suboptimal alignment of biological sequences," Proceedings of the 4th annual Symposium on Combinatorial Pattern Matching, Springer Verlag, 1993, pp. 179-196. Google ScholarDigital Library
- 13.Ortalo, R., Y. Deswarte, and M. Kaaniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security", in Dependable Computing for Critical Applications 6 (DCCA'6), (M.Dal Cin, C. Meadows and W.H. Sanders, Eds.), Grainau, Germany, March 5-7 1997, Dependable Computing and Fault-Tolerant Systems, vol. 11, pp.307-328, ISBN 0-8186-8009-1, IEEE Computer Society Press, 1998.Google Scholar
- 14.Ortalo, R., Y. Deswarte, "Quantitative Evaluation of Information System Security", in Global IT Security, Proc. of the IFIP TC11 14th International Conference on Information Security (IFIP/SEC'98), (G. Papp, R. Posch, eds.), August 31 - September 4, Vienna-Budapest, Austria-Hungary, Austrian Computer Society, ISBN 3-85403-116-5, pp. 321-332, 1998.Google Scholar
- 15.Phillips, C. A., "The network inhibition problem," Proceedings of the 25 th Annual ACM Symposium on the Theory of Computing, May 16-18, 1993, pp. 776-785. Google ScholarDigital Library
- 16.Presidential Commission on Critical Infrastructure Protection. Commission Report "Critical Foundations: Protecting America's Infrastructures," October 1997. Available at: http:l/www.pccip.govlreport index.htmlGoogle Scholar
- 17.SATAN. (Security Administrator Tool for Analyzing Networks) tool. SATAN's creators, Mr. Dan Farmer and Mr. Wietse Venema, made SATAN widely available over the Internet without cost starting April 5, 1995. It can be obtained from the web site: http:/l 142.3.223.54/~short/SECURITY/satan.htmlGoogle Scholar
- 18.Tayi, G., Rosencrantz, D. and S. Ravi. "Path Problems in Networks with Vector Valued Edge Weights." Submitted for publication, October 1997.Google Scholar
- 19.Wyss, G. D., Schriner, H. K., and T. R. Gaylor (1996). "Probabilistic Logic Modeling of for Hybrid Network Architectures." Published in the Proceedings of the 21st IEEE Conference on Local Computer Networks. Google ScholarDigital Library
Index Terms
- A graph-based system for network-vulnerability analysis
Recommendations
Cyber-attacks visualisation and prediction in complex multi-stage network
In network security, various protocols exist, but these cannot be said to be secure. Many hackers and illegal agents try to take advantage of the vulnerabilities through various incremental penetrations that can compromise critical systems. The ...
A vulnerability attack graph generation method based on scripts
ICICA'12: Proceedings of the Third international conference on Information Computing and ApplicationsThe vulnerability attack graph is an important method for prevention of network attacks. However, the huge amount of vulnerability has caused great difficulties for attack graph generation. By using the general search methods, we often retrieve many ...
Research of Network Vulnerability Analysis Based on Attack Capability Transfer
CIT '12: Proceedings of the 2012 IEEE 12th International Conference on Computer and Information TechnologyNetwork vulnerability analysis is one of the important techniques to protect network security. Modeling and classification of network vulnerability are introduced firstly, then the concept of attack capability transfer and the algorithm to produce it ...
Comments