A Survey of MulVAL Extensions and Their Attack Scenarios Coverage

Organizations employ various adversary models to assess the risk and potential impact of attacks on their networks. A popular method of visually representing cyber risks is the attack graph. Attack graphs represent vulnerabilities and actions an attacker can take to identify and compromise an organi...

Full description

Bibliographic Details
Main Authors: David Tayouri, Nick Baum, Asaf Shabtai, Rami Puzis
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10070747/