Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Conference Proceedings

Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks

Published: September 24, 2014

Author(s)

Xiaoyan Sun (Penn State University), Jun Dai (Penn State University), Anoop Singhal (NIST), Peng Liu (Penn State University)

Conference

Name: 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014)
Dates: September 24-26, 2014
Location: Beijing, China
Citation: International Conference on Security and Privacy in Communication Networks, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engi vol. 152, pp. 3-23

Abstract

Keywords

Attack Graph; Bayesian network; cloud; stealthy bridge
Control Families

None selected

Documentation

Publication:
Conference Proceedings (DOI)

Supplemental Material:
Paper (see NIST SP 1232, p. SP-927 (pdf)

Topics

Security and Privacy
modeling; threats

Technologies
cloud & virtualization; networks