Network Security Node-Edge Scoring System Using Attack Graph Based on Vulnerability Correlation
As network technology has advanced, and as larger and larger quantities of data are being collected, networks are becoming increasingly complex. Various vulnerabilities are being identified in such networks, and related attacks are continuously occurring. To solve these problems and improve the over...
Main Authors: | Gun-Yoon Shin, Sung-Sam Hong, Jung-Sik Lee, In-Sung Han, Hwa-Kyung Kim, Haeng-Rok Oh |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-07-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/12/14/6852 |
Similar Items
-
Analytical attack modeling and security assessment based on the common vulnerability scoring system
by: Elena Doynikova, et al.
Published: (2017-04-01) -
Vulnerability Management Models Using a Common Vulnerability Scoring System
by: Michał Walkowski, et al.
Published: (2021-09-01) -
Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees
by: Erxia Li, et al.
Published: (2019-07-01) -
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
by: Omar Saif Musabbeh Bin Hamed Almazrouei, et al.
Published: (2023-01-01) -
Modeling and assessing load redistribution attacks considering cyber vulnerabilities in power systems
by: Xingyu Shi, et al.
Published: (2023-09-01)