Vulnerability Assessment by Learning Attack Specifications in Graphs

Virginia N.L. Franqueira, Raul H.C. Lopes

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    76 Downloads (Pure)

    Abstract

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies to networks in general, including social networks and computer grid.
    Original languageEnglish
    Title of host publicationThird International Symposium on Information Assurance and Security, IAS 2007
    Place of PublicationLos Alamitos, NJ
    PublisherIEEE Computer Society Press
    Pages161-164
    Number of pages4
    ISBN (Electronic)978-0-7695-2876-2
    ISBN (Print)978-0-7695-2876-2
    DOIs
    Publication statusPublished - Aug 2007
    Event3rd International Symposium on Information Assurance and Security, IAS 2007 - Manchester, United Kingdom
    Duration: 29 Aug 200731 Aug 2007
    Conference number: 3

    Conference

    Conference3rd International Symposium on Information Assurance and Security, IAS 2007
    Abbreviated titleIAS
    CountryUnited Kingdom
    CityManchester
    Period29/08/0731/08/07

    Keywords

    • EWI-10385
    • IR-64154
    • METIS-241739

    Fingerprint Dive into the research topics of 'Vulnerability Assessment by Learning Attack Specifications in Graphs'. Together they form a unique fingerprint.

    Cite this