Research Journal of Applied Sciences

Year: 2015
Volume: 10
Issue: 11
Page No. 758 - 762

Minimization Analysis of Network Attack Graphs Using Memetic Algorithm

Authors : Azam Faraji and Mohammad Ebrahim Shiri Ahamd Abadi

References

Abadi, M. and S. Jalili, 2006. An ant colony optimization algorithm for network vulnerability analysis. Iran. J. Electr. Electron. Eng., 2: 106-120.
Direct Link  |  

Abadi, M. and S. Jalili, 2008. Minimization analysis of network attack graphs using genetic algorithms. IJ Comput. Appl., 15: 263-273.

Abadi, M. and S. Jalili, 2015. A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs. ISC Int. J. Inf. Secur., 2: 13-32.
Direct Link  |  

Alhomidi, M. and M. Reed, 2014. Attack graph-based risk assessment and optimisation approach. Int. J. Network Secur. Appl.,

Eiben, A.E. and J.E. Smith, 2003. Introduction to Evolutionary Computing. Springer, New York, USA., ISBN-13: 9783540401841, Pages: 199.

Engelbrecht, A.P., 2005. Fundamentals of Computational Swarm Intelligence. 1st Edn., John Wiley and Sons Publishing Inc., New York, USA., ISBN-13: 9780470091913, Pages: 672.

Krasnogor, N., A. Aragon and J. Pacheco, 2006. Memetic Algorithms. In: Metaheuristic Procedures for Training Neutral Networks, Alba, E. and R. Marti (Eds.). Springer, New York, USA., ISBN-13: 9780387334158, pp: 225-248.

Lufeng, Z., T. Hong, C. YiMing and Z. JianBo, 2009. Network security evaluation through attack graph generation. World Acad. Sci. Eng. Technol., 54: 412-416.
Direct Link  |  

Moscato, P. and C. Cotta, 2007. Memetic Algorithms. In: Handbook of Approximation Algorithms and Metaheuristics, Gonzalez, T.F. (Ed.). Taylor and Francis, Boca Raton, FL., pp: 27-1-27-12.

Noel, S., S. Jajodia, L. Wang and A. Singhal, 2010. Measuring security risk of networks using attack graphs. Int. J. Next Gener. Comput., 1: 135-147.
Direct Link  |  

Sheyner, O., J. Haines, S. Jha, R. Lippmann and J.M. Wing, 2002. Automated generation and analysis of attack graphs. Proceedings of the IEEE Symposium Security and Privacy, May 22-25, 2011, California, USA, pp: 273-284.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved