Optimal security hardening using multi-objective optimization on attack tree models of networks
暂无分享,去创建一个
Indrajit Ray | L. Darrell Whitley | Rinku Dewri | Nayot Poolsappasit | L. D. Whitley | I. Ray | Rinku Dewri | N. Poolsappasit
[1] Indrajit Ray,et al. Using Attack Trees to Identify Malicious Attacks from Authorized Insiders , 2005, ESORICS.
[2] Salvatore J. Stolfo,et al. Toward Cost-Sensitive Modeling for Intrusion Detection and Response , 2002, J. Comput. Secur..
[3] Cynthia A. Phillips,et al. Computer-attack graph generation tool , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[4] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[5] Carlos A. Coello Coello,et al. An updated survey of GA-based multiobjective optimization techniques , 2000, CSUR.
[6] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[7] Goldberg,et al. Genetic algorithms , 1993, Robust Control Systems with Genetic Algorithms.
[8] Brett Berger,et al. Data-Centric Quantitative Computer Security Risk Assessment , 2003 .
[9] R. K. Ursem. Multi-objective Optimization using Evolutionary Algorithms , 2009 .
[10] D. E. Goldberg,et al. Genetic Algorithms in Search , 1989 .
[11] Kalyanmoy Deb,et al. A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..
[12] Paul Fischbeck,et al. Multi-attribute risk assessment , 2002 .
[13] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[14] Shawn A. Butler. Security attribute evaluation method: a cost-benefit approach , 2002, ICSE '02.
[15] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[16] Gary Stoneburner,et al. SP 800-30. Risk Management Guide for Information Technology Systems , 2002 .
[17] Sushil Jajodia,et al. Efficient minimum-cost network hardening via exploit dependency graphs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[18] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[19] Jackie Rees Ulmer,et al. Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach , 2006, Decis. Support Syst..
[20] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.