Automatic generation of attack scripts from attack graphs

W Nichols, Z Hill, P Hawrylak, J Hale… - 2018 1st International …, 2018 - ieeexplore.ieee.org
While attack graphs are valuable tools for security analysis, their testing and validation is a
time-consuming process. Once validated, the attack graph can be used to generate testing …

Verifying attack graphs through simulation

Z Hill, WM Nichols, M Papa, JC Hale… - 2017 Resilience …, 2017 - ieeexplore.ieee.org
Verifying attacks against cyber physical systems can be a costly and time-consuming
process. By using a simulated environment, attacks can be verified quickly and accurately …

Naggen: A network attack graph generation tool—IEEE CNS 17 poster

M Barrere, EC Lupu - 2017 IEEE Conference on …, 2017 - ieeexplore.ieee.org
Attack graphs constitute a powerful security tool aimed at modelling the many ways in which
an attacker may compromise different assets in a network. Despite their usefulness in …

Concurrency strategies for attack graph generation

M Li, P Hawrylak, J Hale - 2019 2nd International Conference …, 2019 - ieeexplore.ieee.org
The network attack graph is a powerful tool for analyzing network security, but the
generation of a large-scale graph is non-trivial. The main challenge is from the explosion of …

AGQL: A query language for attack graph based network vulnerability analysis

MS Barik - 2018 Fifth International Conference on Emerging …, 2018 - ieeexplore.ieee.org
Attack graph is a widely used formalism for modeling attacks in computer networks,
particularly the multi step attacks. Many of the existing analysis techniques based on attack …

It Is Time To Steer: A Scalable Framework for Analysis-driven Attack Graph Generation

A Palma, M Angelini - arXiv preprint arXiv:2312.16513, 2023 - arxiv.org
In modern computer networks where sophisticated cyber attacks occur daily, a timely cyber
risk assessment becomes paramount. Attack Graph (AG) represents the best-suited solution …

Design procedure of knowledge base for practical attack graph generation

M Inokuchi, Y Ohta, S Kinoshita, T Yagyu… - Proceedings of the …, 2019 - dl.acm.org
Cyber security assessment is an essential activity for understanding the security risks in an
enterprise environment. While many tools have been developed in order to evaluate the …

A reinforcement learning approach for attack graph analysis

M Yousefi, N Mtetwa, Y Zhang… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
Attack graph approach is a common tool for the analysis of network security. However,
analysis of attack graphs could be complicated and difficult depending on the attack graph …

Streamlining Attack Tree Generation: A Fragment-Based Approach

I Pekaric, M Frick, JG Adigun, R Groner, T Witte… - arXiv preprint arXiv …, 2023 - arxiv.org
Attack graphs are a tool for analyzing security vulnerabilities that capture different and
prospective attacks on a system. As a threat modeling tool, it shows possible paths that an …

Use of attack graphs in security systems

V Shandilya, CB Simmons… - Journal of Computer …, 2014 - Wiley Online Library
Attack graphs have been used to model the vulnerabilities of the systems and their potential
exploits. The successful exploits leading to the partial/total failure of the systems are subject …