Open Access

Network Threat Identification and Analysis Based on a State Transition Graph


Cite

1. Clarke, E. M., E. A. Emerson. Design and Synthesis of Synchronization Skeletons Using Branching Time Temporal Logic. - In: Proceedings of Logic of Programs, Vol. 131 of Lecture Notes in Computer Science, Workshop, Yorktown Heights, New York, 1981, 52-71.10.1007/BFb0025774Search in Google Scholar

2. Cuppens, F., F. Autrel, A. Miege, S. Benferhat. Recognizing Malicious Intention in an Intrusion Detection Process. - In: Second International Conference on Hybrid Intelligent Systems. Santiago, 2002.Search in Google Scholar

3. Huiying, Lv, R. Wang. Identifying Attacking Process Based on Attack State Transition Graph. - In: 3rd International Conference on Computer and Network Technology (ICCNT’2011), Tai Yuan, China, Vol. 4, 26-28 February 2011, 395-400.Search in Google Scholar

4. Williams, L., R. Lippmann, K. Ingols. GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. - In: Viz Sec’2008, LNCS 5210, 2008, 44-59.Search in Google Scholar

5. Ning, P., D. Xu. Learning Attack Strategies from Intrusion Alerts. - In: Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2003, 200-209.10.1145/948109.948137Search in Google Scholar

6. Sheyne r, O., J. Haines, S. Jh a, R. Lippmann, J. M. Wing. Automated Generation and Analysis of Attack Graphs. - In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Oakland, CA, 2002, 273-284.Search in Google Scholar

7. Lippmann, R., K. Ingols, C. Scottet al. Validating and Restoring Defence in Depth Using Attack Graphs. - In: Military Communications Conference, Washington, DC, USA, 2006.10.1109/MILCOM.2006.302434Search in Google Scholar

8. Noel, S., S. Jajodi a. Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. - In: Proceedings of the 21st Annual Computer Security Applications Conference, Tucson, AZ, 2005, 160-169.Search in Google Scholar

9. Martel, S. A New Model for Computer Network Security Risk Analysis. Ph D Paper, Department of System Computer Engineering, Carleton University, Ottawa, Ontario, May 2002.Search in Google Scholar

10. Wang, C., G. Huan g. Network Threat Analysis Based on Vulnerability Relation Model. - Journal of Computer Applications, Vol. 30, 2010, No 11, 3046-3050.10.3724/SP.J.1087.2010.03046Search in Google Scholar

11. Chen, Y., B. Boeh m, L. Sheppard. Value Driven Security Threat Modelling Based on Attack Path Analysis. - In: 40th Hawaii International Conference on System Sciences, 2007, 280-288.10.1109/HICSS.2007.601Search in Google Scholar

12. Yureik, W., C. Abad. UCLog+: A Security Situational Identification System for Incident Storage, Querying, and Correlation. - In: Proceedings of the 14th International Conference on Telecommunication Systems Modelling and Analysis (ICTSM), 2006, 316-322. Search in Google Scholar

eISSN:
1314-4081
ISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology