Cybersecurity: A survey of vulnerability analysis and attack graphs

5Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The network infrastructure is the most critical technical asset of any organization. This network architecture must be useful, efficient, and secure. However, their cybersecurity challenges are immense as the number of attacks is increasing. Consequently, there is a need to have efficient tools to assess the risks, know the vulnerabilities, and find the solutions before the attackers exploit them. The challenges remain in integrating the vulnerability analysis tools in a holistic process that cyber defenders can use to detect an intrusion and respond quickly. Attack graphs showed great importance in analyzing security. In this paper, we present a survey of raised and related topics to the field of vulnerability analysis and attack graphs.

Cite

CITATION STYLE

APA

Ait Maalem Lahcen, R., Mohapatra, R., & Kumar, M. (2018). Cybersecurity: A survey of vulnerability analysis and attack graphs. In Springer Proceedings in Mathematics and Statistics (Vol. 253, pp. 97–111). Springer New York LLC. https://doi.org/10.1007/978-981-13-2095-8_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free