Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model
From MaRDI portal
Publication:342516
DOI10.1016/j.cor.2016.05.005zbMath1349.90821OpenAlexW2404932809MaRDI QIDQ342516
Apurba K. Nandi, Satish Vadlamani, Hugh R. Medal
Publication date: 17 November 2016
Published in: Computers \& Operations Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cor.2016.05.005
Programming involving graphs or networks (90C35) Mixed integer programming (90C11) Approximation methods and heuristics in mathematical programming (90C59) Internet topics (68M11)
Related Items (9)
A mixed-integer programming approach for locating jamming devices in a flow-jamming attack ⋮ Methods for removing links in a network to minimize the spread of infections ⋮ A review of attack graph and attack tree visual syntax in cyber security ⋮ An exact approach for the \(r\)-interdiction covering problem with fortification ⋮ Radio communications interdiction problem under deterministic and probabilistic jamming ⋮ A bi-level model and memetic algorithm for arc interdiction location-routing problem ⋮ An integer linear programming formulation for removing nodes in a network to minimize the spread of influenza virus infections ⋮ Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs ⋮ An exact approach for the r-interdiction median problem with fortification
Uses Software
Cites Work
- Methods for removing links in a network to minimize the spread of infections
- DAG-based attack and defense modeling: don't miss the forest for the attack trees
- Partitioning procedures for solving mixed-variables programming problems
- Deterministic network interdiction
- Interdicting a Nuclear-Weapons Project
- Minimizing a stochastic maximum-reliability path
- A Simplified Algorithm for Obtaining Approximate Solutions to Zero-One Programming Problems
- Error Detecting and Error Correcting Codes
- Securing a border under asymmetric information
- Shortest-path network interdiction
This page was built for publication: Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model