Gonzalez‐Granadillo et al., 2018 - Google Patents
Hypergraph‐driven mitigation of cyberattacksGonzalez‐Granadillo et al., 2018
View PDF- Document ID
- 12988505870044259127
- Author
- Gonzalez‐Granadillo G
- Doynikova E
- Kotenko I
- Garcia‐Alfaro J
- Publication year
- Publication venue
- Internet Technology Letters
External Links
Snippet
We extend a mitigation model that evaluates individual and combined countermeasures against multistep cyberattack scenarios. The goal is to anticipate the actions of an attacker that wants to disrupt a given system (eg, an information system). The process is driven by a …
- 230000000116 mitigating 0 title abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Yeboah-Ofori et al. | Cyber threat predictive analytics for improving cyber supply chain security | |
| Pendleton et al. | A survey on systems security metrics | |
| Noel et al. | Measuring security risk of networks using attack graphs | |
| Sommestad et al. | A probabilistic relational model for security risk analysis | |
| Shameli-Sendi et al. | Taxonomy of intrusion risk assessment and response system | |
| Wang et al. | An attack graph-based probabilistic security metric | |
| US12289336B2 (en) | Ontology-based risk propagation over digital twins | |
| Thuraisingham et al. | A data driven approach for the science of cyber security: Challenges and directions | |
| Haimes et al. | Assessing systemic risk to cloud‐computing technology as complex interconnected systems of systems | |
| Kostiuk et al. | A system for assessing the interdependencies of information system agents in information security risk management using cognitive maps | |
| Alhassan et al. | A fuzzy classifier-based penetration testing for web applications | |
| Brantly | Aesop’s wolves: The deceptive appearance of espionage and attacks in cyberspace | |
| Yeboah-Ofori et al. | Cyberattack ontology: A knowledge representation for cyber supply chain security | |
| Yee | Security metrics: An introduction and literature review | |
| Kumar et al. | A quantitative security risk analysis framework for modelling and analyzing advanced persistent threats | |
| Abo-Alian et al. | A data-driven approach to prioritize MITRE ATT&CK techniques for active directory adversary emulation | |
| Han et al. | An Explainable AI Tool for Operational Risks Evaluation of AI Systems for SMEs | |
| Meriah et al. | A survey of quantitative security risk analysis models for computer systems | |
| Ye et al. | Zero-day vulnerability risk assessment and attack path analysis using security metric | |
| Gonzalez‐Granadillo et al. | Hypergraph‐driven mitigation of cyberattacks | |
| Saint-Hilaire et al. | Matching Knowledge Graphs for Cybersecurity Countermeasures Selection | |
| Barik et al. | RONSI: a framework for calculating return on network security investment | |
| Shan et al. | An approach for internal network security metric based on attack probability | |
| Lier et al. | An iterative five-phase process model to successfully implement AI for cybersecurity in a corporate environment | |
| Singhal et al. | Security ontologies for modeling enterprise level risk assessment |