Using Bayesian networks for probabilistic identification of zero-day attack paths
X Sun, J Dai, P Liu, A Singhal… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Enforcing a variety of security measures (such as intrusion detection systems, and so on)
can provide a certain level of protection to computer networks. However, such security …
can provide a certain level of protection to computer networks. However, such security …
[图书][B] NSDMiner: Automated discovery of network service dependencies
Enterprise networks today host a wide variety of network services, which often depend on
each other to provide and support network-based services and applications. Understanding …
each other to provide and support network-based services and applications. Understanding …
Rippler: Delay injection for service dependency detection
Detecting dependencies among network services has been well-studied in previous
research. These attempts at service dependency detection fall into two classes: active and …
research. These attempts at service dependency detection fall into two classes: active and …
Deep mining port scans from darknet
S Lagraa, Y Chen, J François - International Journal of Network …, 2019 - Wiley Online Library
TCP/UDP port scanning or sweeping is one of the most common technique used by
attackers to discover accessible and potentially vulnerable hosts and applications. Although …
attackers to discover accessible and potentially vulnerable hosts and applications. Although …
On the accurate identification of network service dependencies in distributed systems
The automated identification of network service dependencies remains a challenging
problem in the administration of large distributed systems. Advances in developing solutions …
problem in the administration of large distributed systems. Advances in developing solutions …
Discovering service dependencies in mobile ad hoc networks
The combination of service-oriented applications, with their run-time service binding, and
mobile ad hoc networks, with their transient communication topologies, brings a new level of …
mobile ad hoc networks, with their transient communication topologies, brings a new level of …
On-demand discovery of software service dependencies in MANETs
The dependencies among the components of service-oriented software applications hosted
in a mobile ad hoc network (MANET) are difficult to determine due to the inherent loose …
in a mobile ad hoc network (MANET) are difficult to determine due to the inherent loose …
Mining semantic relations using NetFlow
A Caracas, A Kind, D Gantenbein… - 2008 3rd IEEE/IFIP …, 2008 - ieeexplore.ieee.org
Knowing the dependencies among computing assets and services provides insights into the
computing and business landscape, therefore, facilitating low-risk timely changes in support …
computing and business landscape, therefore, facilitating low-risk timely changes in support …
Enterprise-level cyber situation awareness
X Sun, J Dai, A Singhal, P Liu - Theory and models for cyber situation …, 2017 - Springer
This chapter begins with a literature review of situation awareness (SA) concepts, and a
study on how to apply SA to the cyber field for enterprise-level network security diagnosis …
study on how to apply SA to the cyber field for enterprise-level network security diagnosis …
[PDF][PDF] Fault localization in service-based systems hosted in mobile ad hoc networks
P Novotny - 2013 - wwwhomes.doc.ic.ac.uk
Fault localization in general refers to a technique for identifying the likely root causes of
failures observed in systems formed from components. Fault localization in systems …
failures observed in systems formed from components. Fault localization in systems …