메뉴 건너뛰기




Volumn 6, Issue 1, 2013, Pages 89-99

Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets

Author keywords

Attack defense stochastic game Petri nets; Enterprise network; Security analysis

Indexed keywords

GAME THEORY; PETRI NETS; SECURITY SYSTEMS; STOCHASTIC MODELS; STOCHASTIC SYSTEMS;

EID: 84871690425     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.535     Document Type: Article
Times cited : (34)

References (21)
  • 2
    • 33947173819 scopus 로고    scopus 로고
    • Using stochastic game theory to compute the expected behavior of attackers. In Proceedings of the 2005 International Symposium on Applications and the Internet (Saint2005) Workshops
    • Sallhammar K, Knapskog SJ, Helvik BE. Using stochastic game theory to compute the expected behavior of attackers. In Proceedings of the 2005 International Symposium on Applications and the Internet (Saint2005) Workshops, 2005.
    • (2005)
    • Sallhammar, K.1    Knapskog, S.J.2    Helvik, B.E.3
  • 3
    • 33750944742 scopus 로고    scopus 로고
    • Towards a stochastic model for integrated security and dependability evaluation. In Proceedings of the First International Conference on Availability, Reliability and Security (ARES'06)
    • Sallhammar K, Helvik BE, Knapskog SJ. Towards a stochastic model for integrated security and dependability evaluation. In Proceedings of the First International Conference on Availability, Reliability and Security (ARES'06), 2006.
    • (2006)
    • Sallhammar, K.1    Helvik, B.E.2    Knapskog, S.J.3
  • 4
    • 85128564083 scopus 로고    scopus 로고
    • A game theoretic approach to decision and analysis in network intrusion detection. In Proceedings of the 42nd IEEE Conference on Decision and Control
    • Alpcan T, Basar T. A game theoretic approach to decision and analysis in network intrusion detection. In Proceedings of the 42nd IEEE Conference on Decision and Control, 2003.
    • (2003)
    • Alpcan, T.1    Basar, T.2
  • 5
    • 49249137544 scopus 로고    scopus 로고
    • A stochastic game theoretic approach to attack prediction and optimal active defense strategy decision. 2008 IEEE International Conference on Networking, Sensing and Control
    • Jiang W, Tian Z-h, Zhang H-l, Song X-f. A stochastic game theoretic approach to attack prediction and optimal active defense strategy decision. 2008 IEEE International Conference on Networking, Sensing and Control, 2008; 648-653.
    • (2008) , pp. 648-653
    • Jiang, W.1    Z-h, T.2    H-l, Z.3    Song, X.-f.4
  • 6
    • 16644384919 scopus 로고    scopus 로고
    • Incentive-based modeling and inference of attacker intent, objectives, and strategies
    • Liu P, Zang W, Yu M. Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Transactions on Information and System Security 2005; 8(1): 1-41.
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.1 , pp. 1-41
    • Liu, P.1    Zang, W.2    Yu, M.3
  • 7
    • 84954449334 scopus 로고    scopus 로고
    • Defending against denial-of-service attacks with puzzle auctions. In Proceedings of IEEE Security and Privacy
    • Wang X, Reiter M. Defending against denial-of-service attacks with puzzle auctions. In Proceedings of IEEE Security and Privacy, 2003.
    • (2003)
    • Wang, X.1    Reiter, M.2
  • 8
    • 0037328484 scopus 로고    scopus 로고
    • Sustaining availability of web services under distributed denial of service attacks
    • Xu J, Lee W. Sustaining availability of web services under distributed denial of service attacks. IEEE Transactions on Computers 2003; 52(2): 195-208.
    • (2003) IEEE Transactions on Computers , vol.52 , Issue.2 , pp. 195-208
    • Xu, J.1    Lee, W.2
  • 9
    • 84863052490 scopus 로고    scopus 로고
    • Modeling and analysis of email worm propagation based on stochastic game nets. PDCAT 2011, 8
    • Yu M, Wang Y, Liu L, Cheng X. Modeling and analysis of email worm propagation based on stochastic game nets. PDCAT 2011, 2011.8
    • (2011)
    • Yu, M.1    Wang, Y.2    Liu, L.3    Cheng, X.4
  • 11
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Ortalo R, Deswarte Y. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 1999; 25(5):633-650.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2
  • 12
    • 0036926468 scopus 로고    scopus 로고
    • Modeling and quantification of security attributes of software systems. In Proceedings of the International Conference on Dependable Systems and Networks (DSN'02)
    • Madan BB, Vaidyanathan K, Trivedi KS. Modeling and quantification of security attributes of software systems. In Proceedings of the International Conference on Dependable Systems and Networks (DSN'02), 2002.
    • (2002)
    • Madan, B.B.1    Vaidyanathan, K.2    Trivedi, K.S.3
  • 13
    • 60449090394 scopus 로고    scopus 로고
    • On stochastic modeling for integrated security and dependability evaluation
    • Sallhammar K, Helvik BE, Knapskog SJ. On stochastic modeling for integrated security and dependability evaluation. The Journal of Networks 2006; 1(5):31-42.
    • (2006) The Journal of Networks , vol.1 , Issue.5 , pp. 31-42
    • Sallhammar, K.1    Helvik, B.E.2    Knapskog, S.J.3
  • 14
    • 84871706470 scopus 로고    scopus 로고
    • Using game theory in stochastic models for quantifying security. In Proceedings of the 9th Nordic Workshop on Secure IT-systems.
    • Sallhammar K, Knapskog SJ. Using game theory in stochastic models for quantifying security. In Proceedings of the 9th Nordic Workshop on Secure IT-systems. 2004.
    • (2004)
    • Sallhammar, K.1    Knapskog, S.J.2
  • 15
    • 84856235065 scopus 로고    scopus 로고
    • Stochastic game net and applications in security analysis for enterprise network
    • doi:10.1007/s10207-011-0148-z.
    • Wang Y, Yu M, Li J, Meng K, Lin C, Cheng X. Stochastic game net and applications in security analysis for enterprise network. International Journal of Information Security 2011:1-12. doi:10.1007/s10207-011-0148-z.
    • (2011) International Journal of Information Security , pp. 1-12
    • Wang, Y.1    Yu, M.2    Li, J.3    Meng, K.4    Lin, C.5    Cheng, X.6
  • 16
    • 70449491179 scopus 로고    scopus 로고
    • Security analysis of enterprise network based on stochastic game nets model. ICC'09 Communication and Information Systems Security Symposium
    • Wang Y, Lin C, Wang Y, Meng K. Security analysis of enterprise network based on stochastic game nets model. ICC'09 Communication and Information Systems Security Symposium 2009.
    • (2009)
    • Wang, Y.1    Lin, C.2    Wang, Y.3    Meng, K.4
  • 17
    • 77951603423 scopus 로고    scopus 로고
    • Security analysis for online banking system using hierarchical stochastic game nets model. IEEE Global Communications Conference
    • Wang Y, Lin C, Meng K. Security analysis for online banking system using hierarchical stochastic game nets model. IEEE Global Communications Conference 2009.
    • (2009)
    • Wang, Y.1    Lin, C.2    Meng, K.3
  • 18
    • 78651569852 scopus 로고    scopus 로고
    • Analysis of attack actions for e-commerce based on stochastic game nets model
    • Wang Y, Lin C, Meng K, Lv J. Analysis of attack actions for e-commerce based on stochastic game nets model. Journal of computers 2009; 4(6):461-467.
    • (2009) Journal of computers , vol.4 , Issue.6 , pp. 461-467
    • Wang, Y.1    Lin, C.2    Meng, K.3    Lv, J.4
  • 20
    • 0000392613 scopus 로고
    • Stochastic games. Proceedings of the National Academy of Science USA
    • Shapley LS. Stochastic games. Proceedings of the National Academy of Science USA, vol. 39, 1953; 1095-1100.
    • (1953) , vol.39 , pp. 1095-1100
    • Shapley, L.S.1
  • 21
    • 0024908784 scopus 로고
    • SPNP: Stochastic Petri Net Package. In Proc. Petri Nets and Performance Models
    • Ciaodo G, Muppala J, Trivedi KS. SPNP: Stochastic Petri Net Package. In Proc. Petri Nets and Performance Models, 1989; 142-151.
    • (1989) , pp. 142-151
    • Ciaodo, G.1    Muppala, J.2    Trivedi, K.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.