메뉴 건너뛰기




Volumn 28, Issue 8, 2009, Pages 754-771

PENET: A practical method and tool for integrated modeling of security attacks and countermeasures

Author keywords

Attack Modeling; Attack trees; Computer security; Cyber security; Petri nets; Software development; Survivability

Indexed keywords

ANALYSIS APPROACH; ATTACK TREE; COMPUTER SECURITY; CYBER SECURITY; CYBER-ATTACKS; DEPENDABILITY EVALUATION; DYNAMIC BEHAVIORS; INTEGRATED MODELING; MODELING APPROACH; MODELING CAPABILITIES; MODELING CONSTRUCT; PERFORMABILITY EVALUATION; PERFORMANCE METRICS; PETRI NET REPRESENTATIONS; PRACTICAL METHOD; REPARABILITY; RESEARCH EFFORTS; SECURITY ATTACKS; SECURITY EVALUATION; SOFTWARE DEVELOPMENT; SOFTWARE IMPLEMENTATION; STOCHASTIC MODELING; VULNERABLE SYSTEMS;

EID: 71849094936     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.05.007     Document Type: Article
Times cited : (34)

References (21)
  • 1
    • 84976753721 scopus 로고
    • A class of generalized stochastic Petri nets for the performance analysis of multiprocessor systems
    • Ajmone Marsan M., Balbo G., and Conte G. A class of generalized stochastic Petri nets for the performance analysis of multiprocessor systems. ACM Transactions on Computer Systems 2 1 (1984)
    • (1984) ACM Transactions on Computer Systems , vol.2 , Issue.1
    • Ajmone Marsan, M.1    Balbo, G.2    Conte, G.3
  • 2
    • 33750958509 scopus 로고    scopus 로고
    • Defense trees for economic evaluation of security investments, availability, reliability and security. ARES 2006
    • April
    • Bistarelli S, Fioravanti F, Peretti P. Defense trees for economic evaluation of security investments, availability, reliability and security. ARES 2006. In: The first international conference on 20-22 April 2006; 2006. p. 8.
    • (2006) The first international conference on 20-22 , pp. 8
    • Bistarelli, S.1    Fioravanti, F.2    Peretti, P.3
  • 5
    • 0026925395 scopus 로고
    • Dynamic fault-tree models for fault-tolerant computer systems
    • Dugan J.B., Bavuso S.J., and Boyd M.A. Dynamic fault-tree models for fault-tolerant computer systems. IEEE Transactions on Reliability 41 3 (1992) 363-377
    • (1992) IEEE Transactions on Reliability , vol.41 , Issue.3 , pp. 363-377
    • Dugan, J.B.1    Bavuso, S.J.2    Boyd, M.A.3
  • 7
    • 33847364848 scopus 로고    scopus 로고
    • Casey Fung; Yi-Liang Chen; Xinyu Wang; Lee, J.; Tarquini, R.; Anderson, M.; et-al, Survivability analysis of distributed systems using attack tree methodology, Military Communications Conference. MILCOM 2005. In: IEEE, 1, 17-20 October 2005; 2005. pp. 583-89.
    • Casey Fung; Yi-Liang Chen; Xinyu Wang; Lee, J.; Tarquini, R.; Anderson, M.; et-al, Survivability analysis of distributed systems using attack tree methodology, Military Communications Conference. MILCOM 2005. In: IEEE, vol. 1, 17-20 October 2005; 2005. pp. 583-89.
  • 8
    • 42749101387 scopus 로고    scopus 로고
    • Application of 'attack trees' in security analysis of digital contents e-commerce protocols with copyright protection, Security Technology. CCST '05
    • October
    • Higuero MV, Unzilla JJ, Jacob E, Saiz P, Aguado M, Luengo D. Application of 'attack trees' in security analysis of digital contents e-commerce protocols with copyright protection, Security Technology. CCST '05. In: 39th Annual 2005 International Carnahan Conference on 11-14 October 2005; 2005. pp. 57-60.
    • (2005) 39th Annual 2005 International Carnahan Conference on 11-14 , pp. 57-60
    • Higuero, M.V.1    Unzilla, J.J.2    Jacob, E.3    Saiz, P.4    Aguado, M.5    Luengo, D.6
  • 9
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • Jonsson E., and Olovsson T. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering 23 4 (1997) 235-245
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 14
    • 71849115640 scopus 로고    scopus 로고
    • Moore AP, Ellison RJ, Linger RC. Attack modeling for information security and survivability. Software Engineering Institute Technical Report CMU/SEI-2001; 2001.
    • Moore AP, Ellison RJ, Linger RC. Attack modeling for information security and survivability. Software Engineering Institute Technical Report CMU/SEI-2001; 2001.
  • 16
    • 71849090656 scopus 로고    scopus 로고
    • Towards a stochastic model for integrated security and dependability evaluation, availability, reliability and security. ARES 2006
    • April
    • Sallhammar K, Helvik BE, Knapskog SJ. Towards a stochastic model for integrated security and dependability evaluation, availability, reliability and security. ARES 2006. In: The first international conference on 20-22 April 2006; 2006. p. 8.
    • (2006) The first international conference on 20-22 , pp. 8
    • Sallhammar, K.1    Helvik, B.E.2    Knapskog, S.J.3
  • 17
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: modeling security threats
    • Schneier B. Attack trees: modeling security threats. Dr. Dobb's Journal (December 1999)
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1
  • 19
    • 0029342168 scopus 로고
    • Low overhead multiprocessor allocation strategies exploiting system spare capacity for fault detection and location
    • Tridandapani S., Somani A.K., and Sandadi U.R. Low overhead multiprocessor allocation strategies exploiting system spare capacity for fault detection and location. IEEE Transactions on Computers 44 7 (1995) 865-877
    • (1995) IEEE Transactions on Computers , vol.44 , Issue.7 , pp. 865-877
    • Tridandapani, S.1    Somani, A.K.2    Sandadi, U.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.