A bio-inspired reaction against cyberattacks: AIS-powered optimal countermeasures selection

P Nespoli, FG Mármol, JM Vidal - IEEE Access, 2021 - ieeexplore.ieee.org
Nowadays, Information and Communication Technology (ICT) infrastructures play a crucial
role for human beings, providing essential services at astonishing speed. Nevertheless …

A Systematic Mapping Study on Intrusion Response Systems

A Rezapour, M GhasemiGol, D Takabi - IEEE Access, 2024 - ieeexplore.ieee.org
With the increasing frequency and sophistication of network attacks, network administrators
are facing tremendous challenges in making fast and optimum decisions during critical …

Security countermeasures selection using the meta attack language and probabilistic attack graphs

W Wideł, P Mukherjee, M Ekstedt - IEEE Access, 2022 - ieeexplore.ieee.org
Connecting critical infrastructure assets to the network is absolutely essential for modern
industries. In contrast to the apparent advantages, network connectivity exposes other …

Mission‐centric decision support in cybersecurity via Bayesian Privilege Attack Graph

M Javorník, M Husák - Engineering Reports, 2022 - Wiley Online Library
We present an approach to decision support in cybersecurity with respect to cyber threats
and stakeholders' requirements. We approach situations in which cybersecurity experts …

iCyberGuard: A FlipIt Game for Enhanced Cybersecurity in IIoT

X Chen, W Cao, L Chen, J Han, M Yang… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Social manufacturing has significantly advanced the industrial Internet of Things (IIoT),
integrating information technology and operation technology to enhance production …

Intrusion Response Systems for the 5G Networks and Beyond: A New Joint Security-vs-QoS Optimization Approach

A Bozorgchenani, CC Zarakovitis… - … on Network Science …, 2024 - ieeexplore.ieee.org
Network connectivity exposes the network infrastructure and assets to vulnerabilities that
attackers can exploit. Protecting network assets against attacks requires the application of …

Intelligence in security countermeasures selection

S Tamjidi, A Shameli-Sendi - Journal of Computer Virology and Hacking …, 2023 - Springer
Identifying security risks in organizations and also determining their severity in order to
select appropriate security countermeasures is of great importance in organizations. In the …

AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithm

P Nespoli, F Gomez Marmol… - Proceedings of the 16th …, 2021 - dl.acm.org
Cyberattacks targeting modern network infrastructures are increasing in number and impact.
This growing phenomenon emphasizes the central role of cybersecurity and, in particular …

A Robust and Efficient Risk Assessment Framework for Multi-Step Attacks

H Liao, S Leng, J Yang, J Xu, J Zhang… - 2024 7th International …, 2024 - ieeexplore.ieee.org
Multi-step attacks are launched by external attackers, leading to private data theft and
extortion. Researchers have proposed risk assessment (RA) technology to evaluate real …

ProMD: A Proactive Intrusion Response System for Enterprise Network with Multi-Domain

S Leng, F Li, L Zhang, Y Wen, Y Guo… - 2023 IEEE Intl Conf on …, 2023 - ieeexplore.ieee.org
Enterprise networks are divided into sub-domain structures for resource aggregation and
trust dependency. However, the complex domain structure results in delayed and …