{"title":"Use cases of attack graph for SOC optimization purpose","authors":"Anna Bánáti, Erno Rigó, Rita Fleiner, E. Kail","doi":"10.1109/INES56734.2022.9922617","DOIUrl":null,"url":null,"abstract":"The development and deployment of dynamic and adaptive cyber defense solutions are essential to face the extremely fast evolving and increasingly common cyberattacks. Security Operation Centers (SOC) are widely used recently to correctly identify, analyze, defend, and investigate security incidents. In order to defend our networks, it is also essential to identify vulnerabilities and weaknesses in the system. Nowadays, attack graphs are the most frequently used graphical representations of a system's vulnerabilities as well as different attack paths an attacker may carry out. This paper investigates the possible use cases of attack graphs in a Security Operation Center. It also identifies different areas and point out potential research directions.","PeriodicalId":253486,"journal":{"name":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INES56734.2022.9922617","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The development and deployment of dynamic and adaptive cyber defense solutions are essential to face the extremely fast evolving and increasingly common cyberattacks. Security Operation Centers (SOC) are widely used recently to correctly identify, analyze, defend, and investigate security incidents. In order to defend our networks, it is also essential to identify vulnerabilities and weaknesses in the system. Nowadays, attack graphs are the most frequently used graphical representations of a system's vulnerabilities as well as different attack paths an attacker may carry out. This paper investigates the possible use cases of attack graphs in a Security Operation Center. It also identifies different areas and point out potential research directions.