Abstract
This paper presents an evolutionary approach for learning attack
specifications that describe attack scenarios. The objective is to find
vulnerabilities in computer networks which minimise the cost of an attack with
maximum impact. Although we focus on Insider Threat, the proposed approach
applies to networks in general, including social networks and computer grid.
Original language | English |
---|---|
Title of host publication | Third International Symposium on Information Assurance and Security, IAS 2007 |
Place of Publication | Los Alamitos, NJ |
Publisher | IEEE Computer Society Press |
Pages | 161-164 |
Number of pages | 4 |
ISBN (Electronic) | 978-0-7695-2876-2 |
ISBN (Print) | 978-0-7695-2876-2 |
DOIs | |
Publication status | Published - Aug 2007 |
Event | 3rd International Symposium on Information Assurance and Security, IAS 2007 - Manchester, United Kingdom Duration: 29 Aug 2007 → 31 Aug 2007 Conference number: 3 |
Conference
Conference | 3rd International Symposium on Information Assurance and Security, IAS 2007 |
---|---|
Abbreviated title | IAS |
Country | United Kingdom |
City | Manchester |
Period | 29/08/07 → 31/08/07 |
Keywords
- EWI-10385
- IR-64154
- METIS-241739