메뉴 건너뛰기




Volumn 2, Issue 1, 2009, Pages 83-96

Network risk management using attacker profiling

Author keywords

Attack graphs; Behavior; Risk management

Indexed keywords

NETWORK SECURITY; RISK ANALYSIS; RISK ASSESSMENT; RISK PERCEPTION;

EID: 77954868663     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.58     Document Type: Article
Times cited : (45)

References (27)
  • 1
    • 85071704629 scopus 로고    scopus 로고
    • Desmond J. Checkmate IDS tries to anticipate hackers actions. www.esecurityplanet.com/prodser [12 June], 2003.
    • Desmond J. Checkmate IDS tries to anticipate hackers actions. www.esecurityplanet.com/prodser [12 June], 2003.
  • 2
    • 3042674868 scopus 로고    scopus 로고
    • Checkmate intrusion protection system: Evolution or revolution
    • January 1, 2003, available at
    • Jackson G, Checkmate intrusion protection system: evolution or revolution. Psynapse Technologies, January 1, 2003, available at http://cnscenter.future.co.kr/resource/security/ids/whitepaper.pdf
    • Psynapse Technologies
    • Jackson, G.1
  • 3
    • 85071705767 scopus 로고    scopus 로고
    • CORE Security Technologies, July] 2003
    • Richarte G. Modern intrusion practices. CORE Security Technologies, http://wwwl.corest.com/common/showdoc.php7idx= 360&idxseccion=13&idxmen [July] 2003.
    • Modern intrusion practices
    • Richarte, G.1
  • 5
    • 21344433201 scopus 로고    scopus 로고
    • Changing definition of hackers in popular discourse
    • Chandler A. Changing definition of hackers in popular discourse. International Journal of Sociology and Law 1996; 24(2): 229-252.
    • (1996) International Journal of Sociology and Law , vol.24 , Issue.2 , pp. 229-252
    • Chandler, A.1
  • 6
    • 0042855099 scopus 로고    scopus 로고
    • A sociology of hackers
    • Jasanoff S. A sociology of hackers. The Sociological Review 1998; 46(4): 757-780.
    • (1998) The Sociological Review , vol.46 , Issue.4 , pp. 757-780
    • Jasanoff, S.1
  • 7
    • 85071706589 scopus 로고    scopus 로고
    • Dantu R, Kolan P. Survey of behavior profiles. http://secnet. csci.unt.edu/risk/, 2006.
    • Dantu R, Kolan P. Survey of behavior profiles. http://secnet. csci.unt.edu/risk/, 2006.
  • 8
    • 85071700747 scopus 로고    scopus 로고
    • Rowley I. Managing in an uncertain world: risk analysis and the bottom line. IEEE Colloquium on Systems Engineering Contribution to Increased Profitability, October 1989.
    • Rowley I. Managing in an uncertain world: risk analysis and the bottom line. IEEE Colloquium on Systems Engineering Contribution to Increased Profitability, October 1989.
  • 10
    • 85071706861 scopus 로고    scopus 로고
    • Foreward, by Bred Powell. Know Your Enemy Motives: The Motives and Psychology of the Black-hat Community. Honeynet Project (Whitepaper) http://www.honeynet.org/papers/motives/index.html
    • Foreward, by Bred Powell. Know Your Enemy Motives: The Motives and Psychology of the Black-hat Community. Honeynet Project (Whitepaper) http://www.honeynet.org/papers/motives/index.html
  • 13
    • 85071705105 scopus 로고    scopus 로고
    • The psychology of hackers: A new taxonomy
    • Paper presented at the, San Jose, California, Feb
    • Rogers M. The psychology of hackers: A new taxonomy. Paper presented at the RSA World Security Conference, San Jose, California, Feb 1999.
    • (1999) RSA World Security Conference
    • Rogers, M.1
  • 14
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • December
    • Scheiner B. Attack trees: modeling security threats. Dr. Dobb 's Journal, December 1999 http://www.ddj.com/184411129.
    • (1999) Dr. Dobb 's Journal
    • Scheiner, B.1
  • 19
  • 22
    • 85071703375 scopus 로고    scopus 로고
    • WINBUGS-http://www.mrc-bsu.cam.ac.uk/bugs
    • WINBUGS-http://www.mrc-bsu.cam.ac.uk/bugs
  • 23
    • 85071705285 scopus 로고    scopus 로고
    • HUGIN DEMO-http://www.HUGIN.com/
    • HUGIN DEMO-http://www.HUGIN.com/
  • 25
    • 33846293304 scopus 로고    scopus 로고
    • Understanding complex network attack graphs through clustered adjacency matrices
    • December
    • Noel S, Jajodia S. Understanding complex network attack graphs through clustered adjacency matrices. Annual Computer Security Applications Conference, December 2005.
    • (2005) Annual Computer Security Applications Conference
    • Noel, S.1    Jajodia, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.