메뉴 건너뛰기




Volumn 28, Issue 12, 2005, Pages 1943-1956

Stochastic modeling and evaluation for network security

Author keywords

Attack modeling; Evaluation technique; Network security; Stochastic modeling; Survivability analysis

Indexed keywords

COMPUTER CRIME; COMPUTER NETWORKS; COMPUTER SOFTWARE SELECTION AND EVALUATION; MATHEMATICAL MODELS; PROBABILITY;

EID: 30544436241     PISSN: 02544164     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (43)

References (55)
  • 1
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denial of service attacks: A tutorial
    • Chang R. K. C.. Defending against flooding-based distributed denial of service attacks: A tutorial. IEEE Communications Magazine, 2002, 40(10): 42-51
    • (2005) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.K.C.1
  • 2
    • 0019608720 scopus 로고
    • Formal models for computer security
    • Landwehr C.. Formal models for computer security. Computer Surveys, 1981, 13(3): 247-278
    • (1981) Computer Surveys , vol.13 , Issue.3 , pp. 247-278
    • Landwehr, C.1
  • 8
    • 84860434875 scopus 로고    scopus 로고
    • A structural framework for modeling multi-stage network attacks
    • Vancouver, BC, Canada
    • Daley K., Larson R., Dawkins J.. A structural framework for modeling multi-stage network attacks. In: Proceedings of ICPP Workshops, Vancouver, BC, Canada, 2002, 5-10
    • (2002) Proceedings of ICPP Workshops , pp. 5-10
    • Daley, K.1    Larson, R.2    Dawkins, J.3
  • 13
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Ortalo R., Deswarte Y., Kaaniche M.. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 1999, 25(5): 633-650
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 15
    • 0003735470 scopus 로고    scopus 로고
    • Modeling checking for security protocols
    • Carnegie Mellon University: Technical Report CMU-SCS-97-139
    • Marrero W., Clark E., Jha S.. Modeling checking for security protocols. Carnegie Mellon University: Technical Report CMU-SCS-97-139, 1997
    • (1997)
    • Marrero, W.1    Clark, E.2    Jha, S.3
  • 16
    • 0034963556 scopus 로고    scopus 로고
    • Model checking security properties of control flow graphs
    • Besson F., Jensen J., Metayer D. L., Thorn T.. Model checking security properties of control flow graphs. Computer Security, 2001, 9(3): 217-250
    • (2001) Computer Security , vol.9 , Issue.3 , pp. 217-250
    • Besson, F.1    Jensen, J.2    Metayer, D.L.3    Thorn, T.4
  • 21
    • 1042277255 scopus 로고    scopus 로고
    • A method for modeling and quantifying the security attributes of intrusion tolerant systems
    • Madan B., Goseva-Popstojanova K., Vaidyanathan K., Trivedi K. S.. A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation, 2004, 56(1-4): 167-186
    • (2004) Performance Evaluation , vol.56 , Issue.1-4 , pp. 167-186
    • Madan, B.1    Goseva-Popstojanova, K.2    Vaidyanathan, K.3    Trivedi, K.S.4
  • 28
    • 0038226150 scopus 로고    scopus 로고
    • Attack modeling for information security and survivability
    • Carnegie Mellon University: Technical Note CMV/SEI-2001-TH-001
    • Moore A. P., Ellison R. J., Linger R. C.. Attack modeling for information security and survivability. Carnegie Mellon University: Technical Note CMV/SEI-2001-TH-001, 2001
    • (2001)
    • Moore, A.P.1    Ellison, R.J.2    Linger, R.C.3
  • 29
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • Jonsson E., Olovsson T.. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering, 1997, 23(4): 235-245
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 35
    • 4243503824 scopus 로고
    • Towards quantitative evaluation of computer security
    • Institute National Polytechnique de Toulouse, France
    • Dacier M.. Towards quantitative evaluation of computer security[Ph. D. dissertation]. Institute National Polytechnique de Toulouse, France, 1994
    • (1994)
    • Dacier, M.1
  • 40
    • 21344479789 scopus 로고
    • Exact and ordinary lumpability in finite Markov chains
    • Buchholz P.. Exact and ordinary lumpability in finite Markov chains. Applied Probability, 1994, 31: 59-74
    • (1994) Applied Probability , vol.31 , pp. 59-74
    • Buchholz, P.1
  • 41
    • 0034159340 scopus 로고    scopus 로고
    • Efficient computation of equivalent and reduced representations for stochastic automata
    • Buchholz P.. Efficient computation of equivalent and reduced representations for stochastic automata. Computer Systems Science and Engineering, 2000, 15(2): 93-103
    • (2000) Computer Systems Science and Engineering , vol.15 , Issue.2 , pp. 93-103
    • Buchholz, P.1
  • 42
    • 0022785652 scopus 로고
    • An aggregation technique for the transient analysis of stiff Markov chains
    • Bobbio A., Trivedi K. S.. An aggregation technique for the transient analysis of stiff Markov chains. IEEE Transactions on Computers, 1986, 35(9): 803-814
    • (1986) IEEE Transactions on Computers , vol.35 , Issue.9 , pp. 803-814
    • Bobbio, A.1    Trivedi, K.S.2
  • 43
    • 12344263800 scopus 로고    scopus 로고
    • An approach for bounding reward measures in Markov models using aggregation
    • University of Illinois at Urbana-Champaign Coordinated Science Laboratory: Technical Report Italy, UILV-ENG-04-2206 (CRHC-04-06)
    • Daly D., Buchholz P., Sanders W. H.. An approach for bounding reward measures in Markov models using aggregation. University of Illinois at Urbana-Champaign Coordinated Science Laboratory: Technical Report Italy, UILV-ENG-04-2206 (CRHC-04-06), 2004
    • (2004)
    • Daly, D.1    Buchholz, P.2    Sanders, W.H.3
  • 46
    • 0345914604 scopus 로고    scopus 로고
    • An efficient disk-based tool for solving large Markov models
    • Deavours D. D., Sanders W. H.. An efficient disk-based tool for solving large Markov models. Performance Evaluation, 1998, 33(1): 67-84
    • (1998) Performance Evaluation , vol.33 , Issue.1 , pp. 67-84
    • Deavours, D.D.1    Sanders, W.H.2
  • 49
    • 2542607810 scopus 로고    scopus 로고
    • Quantitative assessment of operational security: Models and tools
    • Laboratory for Analysis and Architecture of Systems: Technical Report 96493
    • Dacier M., Deswarte Y., Kaaniche M.. Quantitative assessment of operational security: Models and tools. Laboratory for Analysis and Architecture of Systems: Technical Report 96493, 1996
    • (1996)
    • Dacier, M.1    Deswarte, Y.2    Kaaniche, M.3
  • 50
    • 0016058662 scopus 로고
    • Survivability analysis of command and control communications networks - Part I, II
    • Erank H.. Survivability analysis of command and control communications networks-part I, II. IEEE Transactions on Communications, 1974, 22(5): 589-605
    • (1974) IEEE Transactions on Communications , vol.22 , Issue.5 , pp. 589-605
    • Erank, H.1
  • 51
    • 0004266644 scopus 로고    scopus 로고
    • On the definition of Survivability
    • Department of Computer Science, University of Virginia: Technical Report CS-00-33
    • Knight J., Sullivan K.. On the definition of Survivability. Department of Computer Science, University of Virginia: Technical Report CS-00-33, 2000
    • (2000)
    • Knight, J.1    Sullivan, K.2
  • 52
    • 0028319421 scopus 로고
    • A framework for characterizing disaster-based network Survivability
    • Liew S. C., Lu K. W.. A framework for characterizing disaster-based network Survivability. IEEE Journal on Selected Areas in Communications, 1994, 12(1): 52-58
    • (1994) IEEE Journal on Selected Areas in Communications , vol.12 , Issue.1 , pp. 52-58
    • Liew, S.C.1    Lu, K.W.2
  • 53
    • 16244421903 scopus 로고    scopus 로고
    • Technical report on enhanced network Survivability performance
    • T1A1.2 Working Group on Network Survivability Performance, Technical Report ANSI, T1. TR. 68
    • T1A1.2 Working Group on Network Survivability Performance, Technical report on enhanced network Survivability performance, Technical Report ANSI, T1. TR. 68, 2001
    • (2001)
  • 54
    • 20444411497 scopus 로고    scopus 로고
    • Research on trustworthy networks
    • Chinese source
    • Lin Chuang, Peng Xue-Hai. Research on trustworthy networks. Chinese Journal of Computers, 2005, 28(5): 751-758 (in Chinese)
    • (2005) Chinese Journal of Computers , vol.28 , Issue.5 , pp. 751-758
    • Lin, C.1    Peng, X.-H.2
  • 55
    • 84931382820 scopus 로고
    • Design of fault-tolerant computers
    • Washington, DC
    • Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS, Washington, DC, 1967, 31: 733-743
    • (1968) Proceedings of AFIPS , vol.31 , pp. 733-743
    • Avizienis, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.