Intelligent cyber security analysis in enterprise networks

Jason H. Li, Renato Levy, Peng Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we position the correct way of using graphical models for enhancing cyber security analysis in enterprise networks. Graphical models can be powerful in representation, analysis and visualization. We describe the need of introducing "intelligence" in security analysis, followed by a critical review of state-of-the-art attack graph approaches. Such review leads to the lessons learned during attack graph research and motivates our unique vision of how we should use graphical models for effective and efficient security analysis.

Original languageEnglish (US)
Title of host publicationRegarding the "Intelligence" in Distributed Intelligent Systems - Papers from the AAAI Fall Symposium, Technical Report
Pages75-78
Number of pages4
StatePublished - Dec 1 2007
Event2007 AAAI Fall Symposium - Arlington, VA, United States
Duration: Nov 9 2007Nov 11 2007

Publication series

NameAAAI Fall Symposium - Technical Report
VolumeFS-07-06

Other

Other2007 AAAI Fall Symposium
CountryUnited States
CityArlington, VA
Period11/9/0711/11/07

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'Intelligent cyber security analysis in enterprise networks'. Together they form a unique fingerprint.

  • Cite this

    Li, J. H., Levy, R., & Liu, P. (2007). Intelligent cyber security analysis in enterprise networks. In Regarding the "Intelligence" in Distributed Intelligent Systems - Papers from the AAAI Fall Symposium, Technical Report (pp. 75-78). (AAAI Fall Symposium - Technical Report; Vol. FS-07-06).