{"title":"自动化安全分析系统中基于攻击图的数据表示","authors":"E. M. Orel, D. A. Moskvin, A. A. Lyashenko","doi":"10.3103/S0146411624701232","DOIUrl":null,"url":null,"abstract":"<p>A mathematical model for data representation is developed for use in automated security analysis systems. The model allows linking information about the system obtained by a specialist during the security analysis process with the set of attack scenarios in which they may be involved. Each time a scenario is applied, new information emerges, which helps expand the attack graph.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1436 - 1441"},"PeriodicalIF":0.6000,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Attack Graph-Based Data Presentation for Use in Automated Security Analysis Systems\",\"authors\":\"E. M. Orel, D. A. Moskvin, A. A. Lyashenko\",\"doi\":\"10.3103/S0146411624701232\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>A mathematical model for data representation is developed for use in automated security analysis systems. The model allows linking information about the system obtained by a specialist during the security analysis process with the set of attack scenarios in which they may be involved. Each time a scenario is applied, new information emerges, which helps expand the attack graph.</p>\",\"PeriodicalId\":46238,\"journal\":{\"name\":\"AUTOMATIC CONTROL AND COMPUTER SCIENCES\",\"volume\":\"58 8\",\"pages\":\"1436 - 1441\"},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2025-03-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"AUTOMATIC CONTROL AND COMPUTER SCIENCES\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://link.springer.com/article/10.3103/S0146411624701232\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","FirstCategoryId":"1085","ListUrlMain":"https://link.springer.com/article/10.3103/S0146411624701232","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Attack Graph-Based Data Presentation for Use in Automated Security Analysis Systems
A mathematical model for data representation is developed for use in automated security analysis systems. The model allows linking information about the system obtained by a specialist during the security analysis process with the set of attack scenarios in which they may be involved. Each time a scenario is applied, new information emerges, which helps expand the attack graph.
期刊介绍:
Automatic Control and Computer Sciences is a peer reviewed journal that publishes articles on• Control systems, cyber-physical system, real-time systems, robotics, smart sensors, embedded intelligence • Network information technologies, information security, statistical methods of data processing, distributed artificial intelligence, complex systems modeling, knowledge representation, processing and management • Signal and image processing, machine learning, machine perception, computer vision