U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Conference Proceedings

Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks

Published: September 24, 2014

Author(s)

Xiaoyan Sun (Penn State University), Jun Dai (Penn State University), Anoop Singhal (NIST), Peng Liu (Penn State University)

Conference

Name: 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014)
Dates: September 24-26, 2014
Location: Beijing, China
Citation: International Conference on Security and Privacy in Communication Networks, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engi vol. 152, pp. 3-23

Announcement

Abstract

Keywords

Attack Graph; Bayesian network; cloud; stealthy bridge
Control Families

None selected

Documentation

Publication:
Conference Proceedings (DOI)

Supplemental Material:
Paper (see NIST SP 1232, p. SP-927 (pdf)

Document History:
09/24/14: Conference Proceedings (Final)

Topics

Security and Privacy
modeling; threats

Technologies
cloud & virtualization; networks