Searched for: +
(1 - 2 of 2)
document
Nadeem, A. (author), Verwer, S.E. (author), Moskal, Stephen (author), Yang, Shanchieh Jay (author)
Attack graphs (AG) are a popular area of research that display all the paths an attacker can exploit to penetrate a network. Existing techniques for AG generation rely heavily on expert input regarding vulnerabilities and network topology. In this work, we advocate the use of AGs that are built directly using the actions observed through...
conference paper 2021
document
Nadeem, A. (author), Verwer, S.E. (author), Yang, Shanchieh Jay (author)
Attack graphs (AG) are used to assess pathways availed by cyber adversaries to penetrate a network. State-of-the-art approaches for AG generation focus mostly on deriving dependencies between system vulnerabilities based on network scans and expert knowledge. In real-world operations however, it is costly and ineffective to rely on constant...
conference paper 2021