TY - GEN
T1 - Intelligent cyber security analysis in enterprise networks
AU - Li, Jason H.
AU - Levy, Renato
AU - Liu, Peng
PY - 2007
Y1 - 2007
N2 - In this paper, we position the correct way of using graphical models for enhancing cyber security analysis in enterprise networks. Graphical models can be powerful in representation, analysis and visualization. We describe the need of introducing "intelligence" in security analysis, followed by a critical review of state-of-the-art attack graph approaches. Such review leads to the lessons learned during attack graph research and motivates our unique vision of how we should use graphical models for effective and efficient security analysis.
AB - In this paper, we position the correct way of using graphical models for enhancing cyber security analysis in enterprise networks. Graphical models can be powerful in representation, analysis and visualization. We describe the need of introducing "intelligence" in security analysis, followed by a critical review of state-of-the-art attack graph approaches. Such review leads to the lessons learned during attack graph research and motivates our unique vision of how we should use graphical models for effective and efficient security analysis.
UR - http://www.scopus.com/inward/record.url?scp=51849158684&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=51849158684&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:51849158684
SN - 9781577353515
T3 - AAAI Fall Symposium - Technical Report
SP - 75
EP - 78
BT - Regarding the "Intelligence" in Distributed Intelligent Systems - Papers from the AAAI Fall Symposium, Technical Report
T2 - 2007 AAAI Fall Symposium
Y2 - 9 November 2007 through 11 November 2007
ER -