>
Fa   |   Ar   |   En
   Use of attack graphs in security systems  
   
نویسنده shandilya v. ,simmons c.b. ,shiva s.
منبع journal of computer networks and communications - 2014 - دوره : 2014 - شماره : 0
چکیده    Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. the successful exploits leading to the partial/total failure of the systems are subject of keen security interest. considerable effort has been expended in exhaustive modeling,analyses,detection,and mitigation of attacks. one prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. this not only gives the simplified representation of the system,but also allows prioritizing the security properties whose violations are of greater concern,for both detection and repair. we present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. based on our research,we identify the potential,challenges,and direction of the current research in using attack graphs. © 2014 vivek shandilya et al.
آدرس department of computer science,university of memphis,memphis, United States, school of computing and informatics,lipscomb university,nashville, United States, department of computer science,university of memphis,memphis, United States
 
     
   
Authors
  
 
 

Copyright 2023
Islamic World Science Citation Center
All Rights Reserved