메뉴 건너뛰기




Volumn 57, Issue 10, 2013, Pages 2159-2180

A stochastic model of attack process for the evaluation of security metrics

Author keywords

Attack modeling; Attack process; Cyber security; Quantitative security evaluation; Security metrics; Stochastic modeling semi Markov chain

Indexed keywords

ATTACK MODELING; ATTACK PROCESS; CYBER SECURITY; QUANTITATIVE SECURITY EVALUATION; SECURITY METRICS; SEMI-MARKOV CHAIN;

EID: 84879205852     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2013.03.011     Document Type: Article
Times cited : (36)

References (43)
  • 7
    • 60449090394 scopus 로고    scopus 로고
    • On stochastic modeling for integrated security and dependability evaluation
    • K. Sallhammar, B.E. Helvik, and S.J. Knapskog On stochastic modeling for integrated security and dependability evaluation Journal of Networks 1 5 2006
    • (2006) Journal of Networks , vol.1 , Issue.5
    • Sallhammar, K.1    Helvik, B.E.2    Knapskog, S.J.3
  • 9
    • 33749647455 scopus 로고    scopus 로고
    • Time-to-compromise model for cyber risk reduction estimation
    • Quality of Protection: Security Measurements and Metrics Springer
    • M.A. McQueen, W.F. Boyer, M.A. Flynn, and G.A. Beitel Time-to-compromise model for cyber risk reduction estimation First Workshop on Quality of Protection Quality of Protection: Security Measurements and Metrics 2005 Springer
    • (2005) First Workshop on Quality of Protection
    • McQueen, M.A.1    Boyer, W.F.2    Flynn, M.A.3    Beitel, G.A.4
  • 11
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • E. Jonsson, and T. Olovsson A quantitative model of the security intrusion process based on attacker behavior IEEE Transactions on Software Engineering 23 4 1997 235 245
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 12
    • 0033325475 scopus 로고    scopus 로고
    • Experiments with quantitative evaluation tools for monitoring operational security
    • R. Ortalo, Y. Deswarte, and M. Kaâniche Experiments with quantitative evaluation tools for monitoring operational security IEEE Transactions on Software Engineering 25 5 1999 635 650
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 635-650
    • Ortalo, R.1    Deswarte, Y.2    Kaâniche, M.3
  • 15
    • 67249143791 scopus 로고    scopus 로고
    • Empirical analysis and statistical modelling of attack processes based on honeypotss
    • Philadelphia (USA), June 25-28
    • M. Kaâniche, E. Alata, V. Nicomette, Y. Deswarte, M. Dacier, Empirical analysis and statistical modelling of attack processes based on honeypots, in: Proc. of WEEDS 2006-Workshop on Empirical Evaluation of Dependability and Security, Philadelphia (USA), June 25-28, 2006.
    • (2006) Proc. of WEEDS 2006-Workshop on Empirical Evaluation of Dependability and Security
    • Kaâniche, M.1
  • 17
    • 84879211186 scopus 로고    scopus 로고
    • A extended stochastic model for quantitative security analyses of networked systems
    • M. Xu, and S. Xu A extended stochastic model for quantitative security analyses of networked systems Internet Mathematics 8 3 2012 288 320
    • (2012) Internet Mathematics , vol.8 , Issue.3 , pp. 288-320
    • Xu, M.1    Xu, S.2
  • 18
    • 67649723048 scopus 로고    scopus 로고
    • Probabilistic model checking for the quantification of DoS security threats
    • S. Basagiannis, P. Katsaros, A. Pombortsis, and N. Alexiou Probabilistic model checking for the quantification of DoS security threats Computers & Security 28 2009 450 465
    • (2009) Computers & Security , vol.28 , pp. 450-465
    • Basagiannis, S.1    Katsaros, P.2    Pombortsis, A.3    Alexiou, N.4
  • 20
    • 51349093483 scopus 로고    scopus 로고
    • A novel quantitative approach for measuring network security
    • The 27th Conference on Computer Communications IEEE CS Press
    • M.S. Ahmed, E. Al-Shaer, and L. khan A novel quantitative approach for measuring network security INFOCOM 2008 The 27th Conference on Computer Communications 2008 IEEE CS Press 1957 1965
    • (2008) INFOCOM 2008 , pp. 1957-1965
    • Ahmed, M.S.1    Al-Shaer, E.2    Khan, L.3
  • 22
    • 84879231292 scopus 로고    scopus 로고
    • On the operational security assurance evaluation of networked IT systems
    • September St Petersburg, Russia
    • A. Hecker, M. Riguidel, On the operational security assurance evaluation of networked IT systems, NEW2AN, September 2009, St Petersburg, Russia.
    • (2009) NEW2AN
    • Hecker, A.1    Riguidel, M.2
  • 24
    • 84860680253 scopus 로고    scopus 로고
    • Ideal based cyber security technical metrics for control systems
    • W. Boyer, and M. McQueen Ideal based cyber security technical metrics for control systems CRITIS 7 2007 3 5
    • (2007) CRITIS , vol.7 , pp. 3-5
    • Boyer, W.1    McQueen, M.2
  • 27
    • 84879224628 scopus 로고    scopus 로고
    • A method for estimation of the success probability of an intrusion process by considering the temporal aspects of the attacker behavior
    • Springer-Verlag ISSN: 0302-9743, ISBN: 978-3-642-01003-3
    • J. Almasizadeh, and M. Abdollahi Azgomi A method for estimation of the success probability of an intrusion process by considering the temporal aspects of the attacker behavior Transactions on Computational Science vol. 4 2009 Springer-Verlag ISSN: 0302-9743, ISBN: 978-3-642-01003-3
    • (2009) Transactions on Computational Science , vol.4
    • Almasizadeh, J.1    Abdollahi Azgomi, M.2
  • 31
    • 0036599965 scopus 로고    scopus 로고
    • System availability with non-exponentially distributed outages
    • Y. Cao, H. Sun, K.S. Trivedi, and J. Han System availability with non-exponentially distributed outages IEEE Transactions on Reliability 51 2 2002 193 198
    • (2002) IEEE Transactions on Reliability , vol.51 , Issue.2 , pp. 193-198
    • Cao, Y.1    Sun, H.2    Trivedi, K.S.3    Han, J.4
  • 42
    • 34547444679 scopus 로고    scopus 로고
    • Technical report, CMU-CS-05-155, School of Computer Science, Carnegie Mellon University, July
    • P. Manadhata, J.M. Wing, An attack surface metric, Technical report, CMU-CS-05-155, School of Computer Science, Carnegie Mellon University, July 2005.
    • (2005) An Attack Surface Metric
    • Manadhata, P.1    Wing, J.M.2
  • 43
    • 50849122332 scopus 로고    scopus 로고
    • Risk assessment in practice: A real case study
    • M. Benini, and S. Sicari Risk assessment in practice: a real case study Computer Communications 31 2008 3691 3699
    • (2008) Computer Communications , vol.31 , pp. 3691-3699
    • Benini, M.1    Sicari, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.