نتایج جستجو برای: cost sensitive attack graph

تعداد نتایج: 915732  

Journal: : 2023

The article proposes the creation of an effective system for detecting and responding to external influences in order minimize consequences breaching protection cloud virtual resources a timely manner. Mathematical models have been improved ensure software-configured networks, namely: mathematical model impact attack on resources, assessing state choosing countermeasure based complex indicator ...

2017
Zhenzhen Bao Lei Wang Jian Guo Dawu Gu

This paper studies functional-graph-based (second) preimage attacks against hash combiners. By exploiting more properties of cyclic nodes of functional graph, we find an improved preimage attack against the XOR combiner with a complexity of 2, while the previous best-known complexity is 2. Moreover, we find the first generic second-preimage attack on Zipper hash with an optimal complexity of 2.

1997
Laura Painton Swiler Timothy Gaylor

This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps,...

2011
Matthias Huber Jörn Müller-Quade

Software services offer many opportunities like reduced cost for IT infrastructure. They also introduce new risks, for example the clients lose control over their data. While data can be secured against external threats using standard techniques, the service providers themselves have to be trusted to ensure privacy. In this paper, we examine methods that can increase the level of privacy a serv...

Journal: :IEEE Transactions on Network and Service Management 2020

Journal: :IEEE Transactions on Knowledge and Data Engineering 2022

With the success of graph embedding model in both academic and industry areas, robustness against adversarial attack inevitably becomes a crucial problem learning. Existing works usually perform white-box fashion: they need to access predictions/labels construct their loss. However, inaccessibility makes impractical for real learning system. This paper promotes current frameworks more general f...

Journal: :JCP 2013
Lixia Xie Xiao Zhang Jiyong Zhang

In order to protect the network and evaluate the network security risks automatically, a new multi-agents risk assessment model based on attack graph (MRAMBAG) is presented. First, a network risk assessment model with master-slave agents is established, especially the functional architecture of master-slave agents and the risk association relation analysis process are designed. Then, the attack...

2002
K. T. Law John C. S. Lui David K. Y. Yau

With the increase of sophistication and severity of DDoS attack, it is important for a victim site to quickly identify the potential attackers and eliminate their traffic. Our work is based on the probabilistic marking algorithm by Savage[12] in which an attack graph can be constructed by a victim site. We extend the concept further such that we can deduce the local traffic rate of each router ...

Journal: :IEEE Transactions on Dependable and Secure Computing 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید