Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Conference Proceedings

Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks

Published: October 30, 2015

Author(s)

Xiaoyan Sun, J. Dai, Anoop Singhal, Peng Liu

Conference

Name: 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014)
Dates: September 24-26, 2014
Location: Beijing, China
Citation: International Conference on Security and Privacy in Communication Networks, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engi vol. 152, pp. 3-23

Abstract

Keywords

Attack Graph; Bayesian network; cloud; stealthy bridge
Control Families

None selected

Documentation

Publication:
Conference Proceedings (DOI)

Supplemental Material:
None available