메뉴 건너뛰기




Volumn 9, Issue 1, 2012, Pages 75-85

Extending attack graph-based security metrics and aggregating their application

Author keywords

measurement; measurement techniques; Network level security and protection

Indexed keywords

GRAPH THEORY; GRAPHIC METHODS; MEASUREMENT; SECURITY SYSTEMS;

EID: 81455142740     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2010.61     Document Type: Article
Times cited : (113)

References (21)
  • 1
    • 81455156587 scopus 로고    scopus 로고
    • SSE-CMM, http://www.sse-cmm.org/metric/metric.asp, 2010.
    • (2010) SSE-CMM
  • 2
    • 81455151016 scopus 로고    scopus 로고
    • MITRE CVE July 2010
    • http://www.cve.mitre.org, MITRE CVE, July 2010.
  • 3
    • 0002067431 scopus 로고    scopus 로고
    • Netstat: A network-based intrusion detection system
    • G. Vigna and R. Kemmerer, "Netstat: A Network-Based Intrusion Detection System," J. Computer Security, vol. 7, 1999.
    • (1999) J. Computer Security , vol.7
    • Vigna, G.1    Kemmerer, R.2
  • 5
    • 33750934506 scopus 로고
    • System security analysis/certication methodology and results
    • C. Weissman, "System Security Analysis/Certication Methodology and Results," Technical Report SDC SP-3728, 1973.
    • (1973) Technical Report SDC SP-3728
    • Weissman, C.1
  • 10
    • 24944500947 scopus 로고    scopus 로고
    • Risk management using behavior based bayesian networks
    • Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005. Proceedings
    • R. Dantu and P. Kolan, "Risk Management Using Behavior Based Bayesian Networks," Intelligence and Security Informatics, pp. 115-126, 2005. (Pubitemid 41314426)
    • (2005) Lecture Notes in Computer Science , vol.3495 , pp. 115-126
    • Dantu, R.1    Kolan, P.2
  • 12
    • 37849021677 scopus 로고    scopus 로고
    • Measuring overall security of network configurations using attack graphs
    • Aug.
    • L. Wang, A. Singhal, and S. Jajodia, "Measuring Overall Security of Network Configurations Using Attack Graphs," Data and Applications Security XXI, vol. 4602, pp. 98-112, Aug. 2007.
    • (2007) Data and Applications Security XXI , vol.4602 , pp. 98-112
    • Wang, L.1    Singhal, A.2    Jajodia, S.3
  • 13
    • 33845524230 scopus 로고    scopus 로고
    • Common vulnerability scoring system
    • P. Mell, K. Scarfone, and S. Romanosky, "Common Vulnerability Scoring System," IEEE Security and Privacy, vol. 4, pp. 85-89, Nov./Dec. 2006. (Pubitemid 44925881)
    • (2006) IEEE Security and Privacy , vol.4 , Issue.6 , pp. 85-89
    • Mell, P.1    Scarfone, K.2    Romanosky, S.3
  • 15
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • DOI 10.1109/32.815323
    • R. Ortalo, Y. Deswarte, and M. Kaaniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security," IEEE Trans. Software Eng., vol. 25, pp. 633-650, Sept. 1999. (Pubitemid 30541841)
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 16
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • Apr.
    • E. Jonsson and T. Olovsson, "A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior," IEEE Trans. Software Eng., Apr. 1997.
    • (1997) IEEE Trans. Software Eng.
    • Jonsson, E.1    Olovsson, T.2
  • 19
  • 21
    • 17644397602 scopus 로고
    • Laplace and the indifference principle in the essai philosophique des probabilits
    • P. Dupount, "Laplace and the Indifference Principle in the 'Essai Philosophique Des Probabilits'," Rend. Sem. Mat. Univ. Politec. Torino, vol. 36, pp. 125-137, 1977/78.
    • (1977) Rend. Sem. Mat. Univ. Politec. Torino , vol.36 , pp. 125-137
    • Dupount, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.