A bio-inspired reaction against cyberattacks: AIS-powered optimal countermeasures selection
Nowadays, Information and Communication Technology (ICT) infrastructures play a crucial
role for human beings, providing essential services at astonishing speed. Nevertheless …
role for human beings, providing essential services at astonishing speed. Nevertheless …
A Systematic Mapping Study on Intrusion Response Systems
A Rezapour, M GhasemiGol, D Takabi - IEEE Access, 2024 - ieeexplore.ieee.org
With the increasing frequency and sophistication of network attacks, network administrators
are facing tremendous challenges in making fast and optimum decisions during critical …
are facing tremendous challenges in making fast and optimum decisions during critical …
Security countermeasures selection using the meta attack language and probabilistic attack graphs
W Wideł, P Mukherjee, M Ekstedt - IEEE Access, 2022 - ieeexplore.ieee.org
Connecting critical infrastructure assets to the network is absolutely essential for modern
industries. In contrast to the apparent advantages, network connectivity exposes other …
industries. In contrast to the apparent advantages, network connectivity exposes other …
Mission‐centric decision support in cybersecurity via Bayesian Privilege Attack Graph
M Javorník, M Husák - Engineering Reports, 2022 - Wiley Online Library
We present an approach to decision support in cybersecurity with respect to cyber threats
and stakeholders' requirements. We approach situations in which cybersecurity experts …
and stakeholders' requirements. We approach situations in which cybersecurity experts …
iCyberGuard: A FlipIt Game for Enhanced Cybersecurity in IIoT
Social manufacturing has significantly advanced the industrial Internet of Things (IIoT),
integrating information technology and operation technology to enhance production …
integrating information technology and operation technology to enhance production …
Intrusion Response Systems for the 5G Networks and Beyond: A New Joint Security-vs-QoS Optimization Approach
A Bozorgchenani, CC Zarakovitis… - … on Network Science …, 2024 - ieeexplore.ieee.org
Network connectivity exposes the network infrastructure and assets to vulnerabilities that
attackers can exploit. Protecting network assets against attacks requires the application of …
attackers can exploit. Protecting network assets against attacks requires the application of …
Intelligence in security countermeasures selection
S Tamjidi, A Shameli-Sendi - Journal of Computer Virology and Hacking …, 2023 - Springer
Identifying security risks in organizations and also determining their severity in order to
select appropriate security countermeasures is of great importance in organizations. In the …
select appropriate security countermeasures is of great importance in organizations. In the …
AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithm
P Nespoli, F Gomez Marmol… - Proceedings of the 16th …, 2021 - dl.acm.org
Cyberattacks targeting modern network infrastructures are increasing in number and impact.
This growing phenomenon emphasizes the central role of cybersecurity and, in particular …
This growing phenomenon emphasizes the central role of cybersecurity and, in particular …
A Robust and Efficient Risk Assessment Framework for Multi-Step Attacks
H Liao, S Leng, J Yang, J Xu, J Zhang… - 2024 7th International …, 2024 - ieeexplore.ieee.org
Multi-step attacks are launched by external attackers, leading to private data theft and
extortion. Researchers have proposed risk assessment (RA) technology to evaluate real …
extortion. Researchers have proposed risk assessment (RA) technology to evaluate real …
ProMD: A Proactive Intrusion Response System for Enterprise Network with Multi-Domain
S Leng, F Li, L Zhang, Y Wen, Y Guo… - 2023 IEEE Intl Conf on …, 2023 - ieeexplore.ieee.org
Enterprise networks are divided into sub-domain structures for resource aggregation and
trust dependency. However, the complex domain structure results in delayed and …
trust dependency. However, the complex domain structure results in delayed and …