메뉴 건너뛰기




Volumn 53, Issue 3, 2012, Pages 599-610

A novel Risk Assessment and Optimisation Model for a multi-objective network security countermeasure selection problem

Author keywords

Countermeasure selection problem; Financial decision support; Multi objective optimisation; Risk assessment; Tabu search

Indexed keywords

BUDGET CUTS; DATA LOSS; EFFICIENT FRONTIER; FINAL DECISION; FINANCIAL COSTS; FINANCIAL DECISION SUPPORT; HIGH DEMAND; MULTI OBJECTIVE; NONDOMINATED SOLUTIONS; OPTIMISATION MODELS; SECURITY COUNTERMEASURES; SECURITY MEASURE; SELECTION PROBLEMS; SYSTEM KNOWLEDGE;

EID: 84862573944     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2012.04.001     Document Type: Article
Times cited : (103)

References (37)
  • 5
    • 24644494525 scopus 로고    scopus 로고
    • Information Security Breaches Survey
    • DTI Department of Trade and Industry
    • DTI Information Security Breaches Survey Tech. rep 2004 Department of Trade and Industry
    • (2004) Tech. Rep
  • 7
    • 0004215426 scopus 로고    scopus 로고
    • Kluwer Academic Publishers Norwell, MA, USA
    • F. Glover, and M. Laguna Tabu Search 1997 Kluwer Academic Publishers Norwell, MA, USA
    • (1997) Tabu Search
    • Glover, F.1    Laguna, M.2
  • 8
    • 32544451794 scopus 로고    scopus 로고
    • Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach
    • DOI 10.1016/j.dss.2004.06.004, PII S0167923604001332
    • M. Gupta, J. Rees, A. Chaturvedi, and J. Chi Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach Decision Support Systems 41 2006 592 603 (Pubitemid 43233889)
    • (2006) Decision Support Systems , vol.41 , Issue.3 , pp. 592-603
    • Gupta, M.1    Rees, J.2    Chaturvedi, A.3    Chi, J.4
  • 9
    • 84862557032 scopus 로고    scopus 로고
    • IBM Accessed before 1st of October 2011
    • IBM Software online catalog http://www-01.ibm.com/software/info/app/ ecatalog 2011 Accessed before 1st of October 2011
    • (2011) Software Online Catalog
  • 14
    • 79251470551 scopus 로고    scopus 로고
    • A globus-based distributed enumerative search algorithm for multi-objective optimization
    • Departamento de Lenguajes y Ciencias de la Computacion, University of Malaga
    • F. Luna, A.J. Nebro, and E. Alba A globus-based distributed enumerative search algorithm for multi-objective optimization Tech. rep 2004 Departamento de Lenguajes y Ciencias de la Computacion, University of Malaga
    • (2004) Tech. Rep
    • Luna, F.1    Nebro, A.J.2    Alba, E.3
  • 17
    • 78449280453 scopus 로고    scopus 로고
    • A visualisation technique for the identification of security threats in networked systems
    • C. Maple, and V. Viduto A visualisation technique for the identification of security threats in networked systems Information Visualisation 2010 551 556
    • (2010) Information Visualisation , pp. 551-556
    • Maple, C.1    Viduto, V.2
  • 18
    • 51049107864 scopus 로고    scopus 로고
    • A complete guide to the common vulnerability scoring system version 2.0
    • P. Mell, K. Scarfone, and S. Romanosky A complete guide to the common vulnerability scoring system version 2.0 Tech. rep 2007
    • (2007) Tech. Rep
    • Mell, P.1    Scarfone, K.2    Romanosky, S.3
  • 21
    • 48249084117 scopus 로고    scopus 로고
    • Interactive selection of ISO 27001 controls under multiple objectives
    • T. Neubauer, A. Ekelhart, and S. Fenz Interactive selection of ISO 27001 controls under multiple objectives SEC 2008 477 492
    • (2008) SEC , pp. 477-492
    • Neubauer, T.1    Ekelhart, A.2    Fenz, S.3
  • 22
    • 84882740544 scopus 로고    scopus 로고
    • Vulnerability-specific execution filtering for exploit prevention on commodity software
    • J. Newsome, D. Brumley, and D.X. Song Vulnerability-specific execution filtering for exploit prevention on commodity software NDSS 2006
    • (2006) NDSS
    • Newsome, J.1    Brumley, D.2    Song, D.X.3
  • 24
    • 84944727025 scopus 로고    scopus 로고
    • Efficient minimum-cost network hardening via exploit dependency graphs
    • S. Noel, S. Jajodia, B. O'Berry, and M. Jacobs Efficient minimum-cost network hardening via exploit dependency graphs ACSAC 2003 86 95
    • (2003) ACSAC , pp. 86-95
    • Noel, S.1    Jajodia, S.2    O'Berry, B.3    Jacobs, M.4
  • 26
    • 84862557034 scopus 로고    scopus 로고
    • Softerra Accessed before 1st of October 2011
    • Softerra Softerra LDAP administrator http://www.ldapbrowser.com/purchase. htm 2011 Accessed before 1st of October 2011
    • (2011) Softerra LDAP Administrator
  • 28
    • 33744465957 scopus 로고    scopus 로고
    • Symantec Accessed before 1st of October 2011
    • Symantec SSL certificates https://www.verisign.co.uk/ssl Accessed before 1st of October 2011
    • SSL Certificates
  • 29
    • 83455215832 scopus 로고    scopus 로고
    • Information security - Best practice measures for protecting your business
    • Department of Trade and Industry
    • M. Templeman, M. Beishon, L. Malachowski, A. Wilson, T. Nash, and L. Robertson Information security - best practice measures for protecting your business Tech. rep 2005 Department of Trade and Industry
    • (2005) Tech. Rep
    • Templeman, M.1    Beishon, M.2    Malachowski, L.3    Wilson, A.4    Nash, T.5    Robertson, L.6
  • 31
    • 84862587703 scopus 로고    scopus 로고
    • US-CERT Accessed before 1st of April 2011
    • US-CERT Introduction to recommended practices http://www.us-cert.gov/ control-systems/practices/ Accessed before 1st of April 2011
    • Introduction to Recommended Practices
  • 32
    • 84862527936 scopus 로고    scopus 로고
    • Information Security Breaches Survey
    • PriceWaterHouseCoopers
    • S. Vadera, C. Potter, and A. Beard Information Security Breaches Survey Tech. rep 2008 PriceWaterHouseCoopers
    • (2008) Tech. Rep
    • Vadera, S.1    Potter, C.2    Beard, A.3
  • 33
    • 77952903083 scopus 로고    scopus 로고
    • 2008 Data Breach Investigations Report
    • Verizon Verizon Business RISK Team
    • Verizon 2008 Data Breach Investigations Report Tech. rep 2008 Verizon Business RISK Team
    • (2008) Tech. Rep
  • 34
    • 79952085816 scopus 로고    scopus 로고
    • An analytical evaluation of network security modelling techniques applied to manage threats, International Conference on Broadband, Wireless Computing
    • V. Viduto, C. Maple, and W. Huang An analytical evaluation of network security modelling techniques applied to manage threats, International Conference on Broadband, Wireless Computing Communication and Applications 2010 117 123
    • (2010) Communication and Applications , pp. 117-123
    • Viduto, V.1    Maple, C.2    Huang, W.3
  • 36
    • 33750984193 scopus 로고    scopus 로고
    • Minimum-cost network hardening using attack graphs
    • DOI 10.1016/j.comcom.2006.06.018, PII S0140366406002271
    • L. Wang, S. Noel, and S. Jajodia Minimum-cost network hardening using attack graphs Computer Communications 29 2006 3812 3824 (Pubitemid 44751132)
    • (2006) Computer Communications , vol.29 , Issue.18 , pp. 3812-3824
    • Wang, L.1    Noel, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.