Abstract
During the past years logical attack graphs were used to find the most critical vulnerabilities and devise efficient hardening strategies for organizational networks. Most techniques for ranking vulnerabilities either do not scale well, eg brute-force attack plan enumeration, or are not well suited for the analysis of logical attack graphs, eg centrality measures.
Original language | English |
---|---|
Title of host publication | IWAISe: First International Workshop on Artificial Intelligence in Security |
Volume | 41 |
State | Published - 2017 |