{"title":"Costs Technique for Analysis Attacks Graphs in Computer Systems","authors":"Narimene Bair, L. Hamza, Lillia Ouali","doi":"10.1109/ICCIT54785.2021.9689915","DOIUrl":null,"url":null,"abstract":"In this paper, we define a new technique for analysing attack graphs in order to protect networks and computer systems from the risks and threats that can affect them. Our approach is based on logic expression of attacks scenarios, generated by any tool, in order to obtain a minimal set of vulnerabilities to remove. After identifying the dependencies between these vulnerabilities we propose the best cost paths to remove. As a result, we obtain the deleted paths with a minimal cost.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 24th International Conference on Computer and Information Technology (ICCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIT54785.2021.9689915","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, we define a new technique for analysing attack graphs in order to protect networks and computer systems from the risks and threats that can affect them. Our approach is based on logic expression of attacks scenarios, generated by any tool, in order to obtain a minimal set of vulnerabilities to remove. After identifying the dependencies between these vulnerabilities we propose the best cost paths to remove. As a result, we obtain the deleted paths with a minimal cost.