Հարձակման գրաֆների համեմատական վերլուծություն; Сравнительный анализ графов атак
It is well-known that nowadays computers and networks that are unique in their computational and service provision power have also major weaknesses and vulnerabilities that can be exploited by outsiders in compromising the valuable data and knowledge. Network administrators and network security analysts must be aware of different properties of current software solutions and diversity of problems regarding the possible protection of network assets. This means that they must know and use the latest and newest types of vulnerabilities, techniques and tools. “Attack Graphs” present formalized network maps and help with analysis of possible vulnerabilities that may exist in the network. Hence, in this paper we will describe some basic concepts that can be used to understand and generate the attack graphs.
oai:arar.sci.am:258794
ՀՀ ԳԱԱ Հիմնարար գիտական գրադարան
Dec 8, 2023
Jul 24, 2020
210
https://arar.sci.am/publication/281908
Edition name | Date |
---|---|
Comparative analysis of attack graphs | Dec 8, 2023 |
Seda N. Manukian
E. P. Serrano M. I. Troparevsky M. A. Fabio Գլխավոր խմբ․՝ Մ․ Մ․ Ջրբաշյան (1966-1994) Ռ․ Վ․ Համբարձումյան (1994-2009) Ա․ Ա․ Սահակյան (2010-)
Gatsinzi, J.-B. Գլխ. խմբ.՝ Անրի Ներսեսյան Պատ. խմբ.՝ Լինդա Խաչատրյան Խմբ. տեղակալ՝ Ռաֆայել Բարխուդարյան
S. Markossian G. Gasparian I. Karapetian A. Markosian