U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Conference Paper

Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks

Published: September 24, 2014

Author(s)

Xiaoyan Sun (Penn State University), Jun Dai (Penn State University), Anoop Singhal (NIST), Peng Liu (Penn State University)

Conference

Name: 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014)
Dates: 09/24/2014 - 09/26/2014
Location: Beijing, China
Citation: International Conference on Security and Privacy in Communication Networks, vol. 152, pp. 3-23

Abstract

Keywords

Attack Graph; Bayesian network; cloud; stealthy bridge
Control Families

None selected

Documentation

Publication:
https://doi.org/10.1007/978-3-319-23829-6_1

Supplemental Material:
Paper (see NIST SP 1232, p. SP-927 (pdf)

Document History:
09/24/14: Conference Paper (Final)

Topics

Security and Privacy

modeling, threats

Technologies

cloud & virtualization, networks