Scalable attack modelling in support of security information and event management

Includes bibliographical references === While assessing security on single devices can be performed using vulnerability assessment tools, modelling of more intricate attacks, which incorporate multiple steps on different machines, requires more advanced techniques. Attack graphs are a promising tech...

Full description

Bibliographic Details
Main Author: Dennie, Keiran
Other Authors: Hutchison, Andrew
Format: Dissertation
Language:English
Published: University of Cape Town 2014
Online Access:http://hdl.handle.net/11427/9205