Cyber Attacks Prediction Model Based on Bayesian Network

作者: Jinyu Wu , Lihua Yin , Yunchuan Guo

DOI: 10.1109/ICPADS.2012.117

关键词:

摘要: … After constructing the Bayesian network, we compute the attack probabilities on the … factors by Bayesian network, we apply the state-of-the-art Bayesian network probability computing …

参考文章(7)
Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu, Edmund Clarke, Jeannette Wing, Ranking Attack Graphs Lecture Notes in Computer Science. pp. 127- 144 ,(2006) , 10.1007/11856214_7
Peng Xie, Jason H Li, Xinming Ou, Peng Liu, Renato Levy, None, Using Bayesian networks for cyber security analysis dependable systems and networks. pp. 211- 220 ,(2010) , 10.1109/DSN.2010.5544924
Xinming Ou, Wayne F Boyer, Miles A McQueen, A scalable approach to attack graph generation Proceedings of the 13th ACM conference on Computer and communications security - CCS '06. pp. 336- 345 ,(2006) , 10.1145/1180405.1180446
N. Poolsappasit, R. Dewri, I. Ray, Dynamic Security Risk Management Using Bayesian Attack Graphs IEEE Transactions on Dependable and Secure Computing. ,vol. 9, pp. 61- 74 ,(2012) , 10.1109/TDSC.2011.34
S. Jha, O. Sheyner, J. Wing, Two formal analyses of attack graphs ieee computer security foundations symposium. pp. 49- 63 ,(2002) , 10.1109/CSFW.2002.1021806