Abstract
In this paper, a new technique for automatic generation of complex intruder attacks is proposed. In this approach, the generation of attack scenarios is guided by an intruder strategy. Thus, only attack scenarios achieving the intruder objectives are generated. Therefore, the generated attack graph do not contain redundant nodes or edges, and enables a network administrator to have a better visualisation and apprehension of different attack scenarios for a computer network. In this way, our approach is made as a candidate for increasing accuracy of the attack graph generated based on the use of the intruder strategy.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Information and Computer Security
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.