{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:54:24Z","timestamp":1743155664079,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031490989"},{"type":"electronic","value":"9783031490996"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-49099-6_6","type":"book-chapter","created":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T06:02:34Z","timestamp":1702015354000},"page":"91-108","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection and Hardening Strategies to Secure an Enterprise Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2549-6578","authenticated-orcid":false,"given":"Preetam","family":"Mukherjee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6453-5520","authenticated-orcid":false,"given":"Sabu M.","family":"Thampi","sequence":"additional","affiliation":[]},{"given":"N.","family":"Rohith","sequence":"additional","affiliation":[]},{"given":"Bishwajit Kumar","family":"Poddar","sequence":"additional","affiliation":[]},{"given":"Ipshita","family":"Sen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,9]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, pp. 217\u2013224. ACM (2002)","DOI":"10.1145\/586110.586140"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Anjum, F., Subhadrabandhu, D., Sarkar, S., Shetty, R.: On optimal placement of intrusion detection modules in sensor networks. In: First International Conference on Broadband Networks, pp. 690\u2013699. IEEE (2004)","DOI":"10.1109\/BROADNETS.2004.52"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Bistarelli, S., Fioravanti, F., Peretti, P.: Defense trees for economic evaluation of security investments. In: First International Conference on Availability, Reliability and Security (ARES\u201906), pp. 8-pp. IEEE (2006)","DOI":"10.1109\/ARES.2006.46"},{"key":"6_CR4","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-981-13-5826-5_4","volume-title":"Security in Computing and Communications","author":"GS Bopche","year":"2019","unstructured":"Bopche, G.S., Rai, G.N., Mehtre, B.M.: Inter-path diversity metrics for increasing networks robustness against zero-day attacks. In: Thampi, S.M., Madria, S., Wang, G., Rawat, D.B., Alcaraz Calero, J.M. (eds.) SSCC 2018. CCIS, vol. 969, pp. 53\u201366. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-5826-5_4"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Chen, H., Clark, J.A., Shaikh, S.A., Chivers, H., Nobles, P.: Optimising IDS sensor placement. In: 2010 International Conference on Availability, Reliability and Security, pp. 315\u2013320. IEEE (2010)","DOI":"10.1109\/ARES.2010.92"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Edge, K.S., Dalton, G.C., Raines, R.A., Mills, R.F.: Using attack and protection trees to analyze threats and defenses to homeland security. In: MILCOM 2006\u20132006 IEEE Military Communications Conference, pp. 1\u20137. IEEE (2006)","DOI":"10.1109\/MILCOM.2006.302512"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Fila, B., Wide\u0142, W.: Exploiting attack-defense trees to find an optimal set of countermeasures. In: Proceedings of the 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, MA, USA, 22\u201326 June 2020, pp. 395\u2013410. IEEE (2020)","DOI":"10.1109\/CSF49147.2020.00035"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"43586","DOI":"10.1109\/ACCESS.2018.2863244","volume":"6","author":"G George","year":"2018","unstructured":"George, G., Thampi, S.M.: A graph-based security framework for securing industrial IoT networks from vulnerability exploitations. IEEE Access 6, 43586\u201343601 (2018)","journal-title":"IEEE Access"},{"issue":"9","key":"6_CR9","doi-asserted-by":"publisher","first-page":"314","DOI":"10.3390\/a15090314","volume":"15","author":"O Grigorescu","year":"2022","unstructured":"Grigorescu, O., Nica, A., Dascalu, M., Rughinis, R.: CVE2ATT&CK: BERT-based mapping of CVEs to MITRE ATT&CK techniques. Algorithms 15(9), 314 (2022)","journal-title":"Algorithms"},{"key":"6_CR10","unstructured":"Information security, cybersecurity and privacy protection - Guidance on managing information security risks. Standard, ISO\/IEC, Geneva, CH, October 2022"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Johnson, P., Lagerstr\u00f6m, R., Ekstedt, M.: A meta language for threat modeling and attack simulations. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, 27\u201330 August 2018, pp. 38:1\u201338:8. ACM (2018)","DOI":"10.1145\/3230833.3232799"},{"key":"6_CR12","unstructured":"Kaloroumakis, P.E., Smith, M.J.: Toward a knowledge graph of cybersecurity countermeasures. Corporation, Editor (2021)"},{"issue":"3","key":"6_CR13","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1016\/j.ejor.2019.04.035","volume":"278","author":"MHR Khouzani","year":"2019","unstructured":"Khouzani, M.H.R., Liu, Z., Malacaria, P.: Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs. Eur. J. Oper. Res. 278(3), 894\u2013903 (2019)","journal-title":"Eur. J. Oper. Res."},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-642-19751-2_6","volume-title":"Formal Aspects of Security and Trust","author":"B Kordy","year":"2011","unstructured":"Kordy, B., Mauw, S., Radomirovi\u0107, S., Schweitzer, P.: Foundations of attack\u2013defense trees. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 80\u201395. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19751-2_6"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Kuppa, A., Aouad, L., Le-Khac, N.A.: Linking CVE\u2019s to MITRE ATT &CK techniques. In: The 16th International Conference on Availability, Reliability and Security, pp. 1\u201312 (2021)","DOI":"10.1145\/3465481.3465758"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Mukherjee, P., Mazumdar, C.: Attack difficulty metric for assessment of network security. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2018)","DOI":"10.1145\/3230833.3232817"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Mukherjee, P., Mazumdar, C.: \u201cSecurity Concern\u201d as a metric for enterprise business processes. IEEE Syst. J. 13(4), 4015\u20134026 (2019)","DOI":"10.1109\/JSYST.2019.2918116"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Mukherjee, P., Sengupta, A., Mazumdar, C.: \u201cSecurity Gap\u201d as a metric for enterprise business processes. Secur. Priv. 5(6), e263 (2022)","DOI":"10.1002\/spy2.263"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s10922-008-9109-x","volume":"16","author":"S Noel","year":"2008","unstructured":"Noel, S., Jajodia, S.: Optimal IDS sensor placement and alert prioritization using attack graphs. J. Netw. Syst. Manag. 16, 259\u2013275 (2008)","journal-title":"J. Netw. Syst. Manag."},{"issue":"5","key":"6_CR20","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1109\/32.815323","volume":"25","author":"R Ortalo","year":"1999","unstructured":"Ortalo, R., Deswarte, Y., Ka\u00e2niche, M.: Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans. Softw. Eng. 25(5), 633\u2013650 (1999)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Pamula, J., Jajodia, S., Ammann, P., Swarup, V.: A weakest-adversary security metric for network configuration security analysis. In: Proceedings of the 2nd ACM Workshop on Quality of Protection, pp. 31\u201338 (2006)","DOI":"10.1145\/1179494.1179502"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Proceedings of the 1998 Workshop on New Security Paradigms, pp. 71\u201379 (1998)","DOI":"10.1145\/310889.310919"},{"issue":"1","key":"6_CR23","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/TDSC.2011.34","volume":"9","author":"N Poolsappasit","year":"2011","unstructured":"Poolsappasit, N., Dewri, R., Ray, I.: Dynamic security risk management using Bayesian attack graphs. IEEE Trans. Dependable Secure Comput. 9(1), 61\u201374 (2011)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Roy, A., Kim, D.S., Trivedi, K.S.: Cyber security analysis using attack countermeasure trees. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, pp. 1\u20134 (2010)","DOI":"10.1145\/1852666.1852698"},{"issue":"1","key":"6_CR25","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.dss.2013.01.001","volume":"55","author":"T Sawik","year":"2013","unstructured":"Sawik, T.: Selection of optimal countermeasure portfolio in IT security planning. Decis. Support Syst. 55(1), 156\u2013164 (2013)","journal-title":"Decis. Support Syst."},{"key":"6_CR26","unstructured":"Schneier, B.: Attack trees. Dr. Dobb\u2019s J. 24(12), 21\u201329 (1999)"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Sheyner, O., Haines, J.W., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp. 273\u2013284. IEEE Computer Society (2002)","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Shin, Y., Kim, K., Lee, J.J., Lee, K.: Focusing on the weakest link: a similarity analysis on phishing campaigns based on the ATT &CK matrix. Secur. Commun. Netw. 2022, 1\u201312 (2022)","DOI":"10.1155\/2022\/1699657"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Soikkeli, J., Mu\u00f1oz-Gonz\u00e1lez, L., Lupu, E.: Efficient attack countermeasure selection accounting for recovery and action costs. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2019)","DOI":"10.1145\/3339252.3339270"},{"key":"6_CR30","unstructured":"Stan, O., et al.: Heuristic approach towards countermeasure selection using attack graphs. arXiv preprint arXiv:1906.10943 (2019)"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"UcedaVelez, T., Morana, M.M.: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis. John Wiley & Sons, Hoboken (2015)","DOI":"10.1002\/9781118988374"},{"key":"6_CR32","unstructured":"van Leeuwen, R.: Cyber-Attack Containment through Actionable Awareness. Doctoral dissertation, Master\u2019s thesis. Technical University of Eindhoven (2022)"},{"key":"6_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-540-70567-3_22","volume-title":"Data and Applications Security XXII","author":"L Wang","year":"2008","unstructured":"Wang, L., Islam, T., Long, T., Singhal, A., Jajodia, S.: An attack graph-based probabilistic security metric. In: Atluri, V. (ed.) DBSec 2008. LNCS, vol. 5094, pp. 283\u2013296. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-70567-3_22"},{"key":"6_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-540-73538-0_9","volume-title":"Data and Applications Security XXI","author":"L Wang","year":"2007","unstructured":"Wang, L., Singhal, A., Jajodia, S.: Measuring the overall security of network configurations using attack graphs. In: Barker, S., Ahn, G.-J. (eds.) DBSec 2007. LNCS, vol. 4602, pp. 98\u2013112. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73538-0_9"},{"key":"6_CR35","doi-asserted-by":"publisher","first-page":"89645","DOI":"10.1109\/ACCESS.2022.3200601","volume":"10","author":"W Widel","year":"2022","unstructured":"Widel, W., Mukherjee, P., Ekstedt, M.: Security countermeasures selection using the meta attack language and probabilistic attack graphs. IEEE Access 10, 89645\u201389662 (2022)","journal-title":"IEEE Access"},{"issue":"1","key":"6_CR36","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s10270-021-00898-7","volume":"21","author":"W Xiong","year":"2022","unstructured":"Xiong, W., Legrand, E., \u00c5berg, O., Lagerstr\u00f6m, R.: Cyber security threat modeling based on the MITRE enterprise ATT &CK matrix. Softw. Syst. Model. 21(1), 157\u2013177 (2022)","journal-title":"Softw. Syst. Model."},{"issue":"12","key":"6_CR37","doi-asserted-by":"publisher","first-page":"1303","DOI":"10.1080\/24725854.2019.1584832","volume":"51","author":"K Zheng","year":"2019","unstructured":"Zheng, K., Albert, L.A., Luedtke, J.R., Towle, E.: A budgeted maximum multiple coverage model for cybersecurity planning and management. IISE Trans. 51(12), 1303\u20131317 (2019)","journal-title":"IISE Trans."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-49099-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T16:14:16Z","timestamp":1730823256000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-49099-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031490989","9783031490996"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-49099-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Raipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iciss.isrdc.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}