National Repository of Grey Literature 2 records found  Search took 0.00 seconds. 
Topological analysis of computer network threats
Řeháková, Jaroslava Antea ; Jirovský, Václav (advisor) ; Trčka, Martin (referee)
To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level vulnerabilities can be combined to achieve high-level attack goals. In this project, we describe a tool that implements a topological approach to network vulnerability analysis. Out TAU Model includes modeling of network security conditions and attack techniques with use of preconditions/postconditions dependencies. An important part of TAU Model is The Graph of Dependencies that is used for creating exploit sequences leading to specifics attack goals. This representation enables highly scalable methods of vulnerability analysis, such as discovering security flaws of given network configuration. An important subject of this project is discussion about complexity and stopping of TAU Model computation. We also mention future extension possibilities and technical challenges.
Topological analysis of computer network threats
Řeháková, Jaroslava Antea ; Trčka, Martin (referee) ; Jirovský, Václav (advisor)
To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level vulnerabilities can be combined to achieve high-level attack goals. In this project, we describe a tool that implements a topological approach to network vulnerability analysis. Out TAU Model includes modeling of network security conditions and attack techniques with use of preconditions/postconditions dependencies. An important part of TAU Model is The Graph of Dependencies that is used for creating exploit sequences leading to specifics attack goals. This representation enables highly scalable methods of vulnerability analysis, such as discovering security flaws of given network configuration. An important subject of this project is discussion about complexity and stopping of TAU Model computation. We also mention future extension possibilities and technical challenges.

See also: similar author names
3 REHÁKOVÁ, Jarmila
13 Reháková, Jana
13 ŘEHÁKOVÁ, Jana
13 Řeháková, Jana
3 Řeháková, Jarmila
1 Řeháková, Jitka
1 Řeháková, Julie
Interested in being notified about new results for this query?
Subscribe to the RSS feed.