메뉴 건너뛰기




Volumn , Issue , 2006, Pages 156-164

Experimental evaluation of network security through a hierarchical quantitative metrics model

Author keywords

Information assurance; Metrics; Network security

Indexed keywords

INTRUSION DETECTION; KNOWLEDGE ENGINEERING; MATHEMATICAL MODELS; METRIC SYSTEM;

EID: 38049172772     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (13)
  • 2
    • 38049185475 scopus 로고    scopus 로고
    • N. Seddigh, P. Pieda, A. Matrawy, B. Nandy, I. Lambadaris, and A. Hatfield, Current Trends and Advances in Information Assurance Metrics, In Proc. of the Second Annual Conf. on Privacy, Security, and Trust, PST2004, Fredericton, NB, October 2004.
    • N. Seddigh, P. Pieda, A. Matrawy, B. Nandy, I. Lambadaris, and A. Hatfield, "Current Trends and Advances in Information Assurance Metrics," In Proc. of the Second Annual Conf. on Privacy, Security, and Trust, PST2004, Fredericton, NB, October 2004.
  • 3
    • 38049141961 scopus 로고    scopus 로고
    • (2005, July) Common Criteria for Information Technology Security Evaluation - Part 1 : CCMB-2005-07-001; Part 2: CCMB-2005-07-002; Part 3: CCMB-2005-07-003; Part 4: CCMB-2005-07-004, Version 3.0, Revision 2. CC.
    • (2005, July) Common Criteria for Information Technology Security Evaluation - Part 1 : CCMB-2005-07-001; Part 2: CCMB-2005-07-002; Part 3: CCMB-2005-07-003; Part 4: CCMB-2005-07-004, Version 3.0, Revision 2. CC.
  • 5
    • 2342576368 scopus 로고    scopus 로고
    • Does the Common Criteria Paradigm Have a Future?
    • January/February
    • J. Hearn, "Does the Common Criteria Paradigm Have a Future?" IEEE Security and Privacy, vol. 2, no. 1, January/February 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.1
    • Hearn, J.1
  • 6
    • 0345097590 scopus 로고    scopus 로고
    • J. Lee, J. Lee, S. Lee, and B. Choi, A CC-based Security Engineering Process Evaluation Model, In Proc. of the 27th Annual Intern. Computer Software and Appl. Conf, COMPSAC.03, November 2003
    • J. Lee, J. Lee, S. Lee, and B. Choi, "A CC-based Security Engineering Process Evaluation Model," In Proc. of the 27th Annual Intern. Computer Software and Appl. Conf. (COMPSAC.03), November 2003.
  • 7
    • 38049111160 scopus 로고    scopus 로고
    • The systems security engineering capability maturity model project, version 3 (final version). SSE-CMM. [Online]. Available: http://www.sse-cmm.org/docs/ssecmmv3final.pdf
    • (2003) The systems security engineering capability maturity model project, version 3 (final version). SSE-CMM. [Online]. Available: http://www.sse-cmm.org/docs/ssecmmv3final.pdf
  • 8
    • 84969544889 scopus 로고    scopus 로고
    • R. B. Vaughn, R. Henning, and A. Siraj, Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy, In Proc. of the 36th Hawaii Intern. Conf. on Sys. Sc. (HICSS-36), January 2003.
    • R. B. Vaughn, R. Henning, and A. Siraj, "Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy," In Proc. of the 36th Hawaii Intern. Conf. on Sys. Sc. (HICSS-36), January 2003.
  • 10
    • 85090433665 scopus 로고    scopus 로고
    • M. Roesch, Snort: Lightweight Intrusion Detection for Networks, In Proceedings of USENIX LISA99, the 13th Systems Administration Conference, November 1999. [Online]. Available: http://www.snort.org
    • M. Roesch, "Snort: Lightweight Intrusion Detection for Networks," In Proceedings of USENIX LISA99, the 13th Systems Administration Conference, November 1999. [Online]. Available: http://www.snort.org
  • 11
    • 10444220813 scopus 로고    scopus 로고
    • Making Hard Decisions with DecisionTools
    • ISBN: 0-534-36597-3
    • R. T. Clemen and T. Reilly, "Making Hard Decisions with DecisionTools," Duxbury/Thomson Learning, 2001, ISBN: 0-534-36597-3.
    • (2001) Duxbury/Thomson Learning
    • Clemen, R.T.1    Reilly, T.2
  • 12
    • 38049145032 scopus 로고    scopus 로고
    • Snort Users Manual 2.4.0
    • August, Online, Available
    • M. Roesch, C. Green, and Sourcefire., "Snort Users Manual 2.4.0," The Snort Project, August 2005. [Online]. Available: http://www.snort.org/docs/snort_manual.pdf
    • (2005) The Snort Project
    • Roesch, M.1    Green, C.2    Sourcefire3
  • 13
    • 38049161145 scopus 로고    scopus 로고
    • (Collected in 2005) Packet Traces from WIDE Backbone stored in the MAWI Working Group Traffic Archive. MAWI. [Online]. Available: http://tracer.csl. sony.co.jp/mawi
    • (Collected in 2005) Packet Traces from WIDE Backbone stored in the MAWI Working Group Traffic Archive. MAWI. [Online]. Available: http://tracer.csl. sony.co.jp/mawi


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.