메뉴 건너뛰기




Volumn 6345 LNCS, Issue , 2010, Pages 626-642

A service dependency model for cost-sensitive intrusion response

Author keywords

[No Author keywords available]

Indexed keywords

CYBERSECURITY; INTRUSION DETECTION;

EID: 78049413993     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15497-3_38     Document Type: Conference Paper
Times cited : (84)

References (26)
  • 1
    • 85165850239 scopus 로고    scopus 로고
    • Return on security investment
    • Aceituno, V.: Return on security investment. ISSA Jounal 1, 16-19 (2006)
    • (2006) ISSA Jounal , vol.1 , pp. 16-19
    • Aceituno, V.1
  • 3
    • 35148826283 scopus 로고    scopus 로고
    • Ph. D. thesis, Cambrdige: Massachusetts Institute of Technology, May
    • Artz, M. L.: A Network Security Planning Architecture. Ph. D. thesis, Cambrdige: Massachusetts Institute of Technology (May 2002)
    • (2002) A Network Security Planning Architecture
    • Artz, M.L.1
  • 4
    • 35248836533 scopus 로고    scopus 로고
    • Using specification-based intrusion detection for automated response
    • Vigna, G., Krügel, C., Jonsson, E. eds., Springer, Heidelberg
    • Balepin, I., Maltsev, S., Rowe, J., Levitt, K.: Using specification-based intrusion detection for automated response. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 136-154. Springer, Heidelberg (2003)
    • (2003) RAID 2003. LNCS , vol.2820 , pp. 136-154
    • Balepin, I.1    Maltsev, S.2    Rowe, J.3    Levitt, K.4
  • 5
    • 33645799476 scopus 로고    scopus 로고
    • Anticorrelation as a criterion to select appropriate counter-measures in an intrusion detection framework
    • Cuppens, F., Autrel, F., Yacine Bouzida, J. G., Gombault, S., Sans, T.: Anticorrelation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annals of Telecommunications 61, 197-217 (2006)
    • (2006) Annals of Telecommunications , vol.61 , pp. 197-217
    • Cuppens, F.1    Autrel, F.2    Bouzida, Y.J.G.3    Gombault, S.4    Sans, T.5
  • 6
    • 2542607810 scopus 로고    scopus 로고
    • Quantitative assessment of operational security: Models and tools
    • May
    • Dacier, M., Deswarte, Y., Kaaniche, M.: Quantitative assessment of operational security: models and tools. Tech. Rep. 96493, LAAS (May 1996)
    • (1996) Tech. Rep. 96493, LAAS
    • Dacier, M.1    Deswarte, Y.2    Kaaniche, M.3
  • 9
    • 27544503196 scopus 로고    scopus 로고
    • Adepts: Adaptive intrusion response using attack graphs in an e-commerce environment
    • Foo, B., Wu, Y. S., Mao, Y. C., Bagchi, S., Spafford, E.: Adepts: Adaptive intrusion response using attack graphs in an e-commerce environment. In: Proc. Intr'l Conf. DSN, pp. 508-517 (2005)
    • (2005) Proc. Intr'l Conf. DSN , pp. 508-517
    • Foo, B.1    Wu, Y.S.2    Mao, Y.C.3    Bagchi, S.4    Spafford, E.5
  • 11
    • 85116520518 scopus 로고    scopus 로고
    • Topological vulnerability analysis: A powerful new approach for network attack prevention, detection, and response
    • Jajodia, S., Noel, S.: Topological vulnerability analysis: A powerful new approach for network attack prevention, detection, and response. Algorithms, Architectures and Information Systems Security 1, 285-305 (2007)
    • (2007) Algorithms, Architectures and Information Systems Security , vol.1 , pp. 285-305
    • Jajodia, S.1    Noel, S.2
  • 12
    • 70350658278 scopus 로고    scopus 로고
    • A service dependency modeling framework for policy-based response enforcement
    • Flegel, U., Bruschi, D. eds., Springer, Heidelberg
    • Kheir, N., Debar, H., Cuppens, F., Cuppens-Boulahia, N., Viinikka, J.: A service dependency modeling framework for policy-based response enforcement. In: Flegel, U., Bruschi, D. (eds.) DIMVA 2009. LNCS, vol. 5587, pp. 174-193. Springer, Heidelberg (2009)
    • (2009) DIMVA 2009. LNCS , vol.5587 , pp. 174-193
    • Kheir, N.1    Debar, H.2    Cuppens, F.3    Cuppens-Boulahia, N.4    Viinikka, J.5
  • 17
    • 85165861857 scopus 로고    scopus 로고
    • Internet explorer vulnerable to hackers, warn experts. microsoft and avg warn of danger
    • March
    • McMillan, R.: Internet explorer vulnerable to hackers, warn experts. microsoft and avg warn of danger. TechWorld magazine (March 2010)
    • (2010) TechWorld Magazine
    • McMillan, R.1
  • 19
    • 78049389822 scopus 로고    scopus 로고
    • Microsoft: Why microsoft dynamics for high-tech and electronics manufacturers
    • Microsoft: Why microsoft dynamics for high-tech and electronics manufacturers? Microsoft Dynamics CRM
    • Microsoft Dynamics CRM
  • 26
    • 84948979531 scopus 로고    scopus 로고
    • Evaluating the impact of automated intrusion response mechanisms
    • Toth, T., Kruegel, C.: Evaluating the impact of automated intrusion response mechanisms. In: Proc. 18th Annual Conf. ACSAC (2002)
    • (2002) Proc. 18th Annual Conf. ACSAC
    • Toth, T.1    Kruegel, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.