메뉴 건너뛰기




Volumn 1, Issue , 2015, Pages 774-781

A novel architecture for predictive cybersecurity using non-homogenous markov models

Author keywords

Attack Graph; CVSS; Cyber Situational Awareness; Markov Model; Security Metrics; Vulnerability Discovery Model; Vulnerability Lifecycle Model

Indexed keywords

MARKOV PROCESSES; RISK ASSESSMENT; SECURITY OF DATA;

EID: 84967333002     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/Trustcom.2015.446     Document Type: Conference Paper
Times cited : (8)

References (41)
  • 6
    • 84967188888 scopus 로고    scopus 로고
    • A software application to analyze affects of temporal and environmental metrics on overall CVSS v2 score
    • Edmonton, Canada, October
    • Assad Ali, Pavol Zavarsky, Dale Lindskog, and Ron Ruhl, " A Software Application to Analyze Affects of Temporal and Environmental Metrics on Overall CVSS v2 Score", Concordia University College of Alberta, Edmonton, Canada, October 2010.
    • (2010) Concordia University College of Alberta
    • Ali, A.1    Zavarsky, P.2    Lindskog, D.3    Ruhl, R.4
  • 8
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • September
    • R. Ortalo, Y. Deswarte, and M. Kaaniche, "Experimenting with quantitative evaluation tools for monitoring operational security," IEEE Transactions on Software Engineering, vol. 25, pp. 633-650, September 1999.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 10
    • 84874133684 scopus 로고    scopus 로고
    • Extending attack graph-based security metrics and aggregating their application
    • N. Idika and B. Bhargava, "Extending attack graph-based security metrics and aggregating their application," Dependable and Secure Computing, IEEE Transactions on, no. 99, pp. 1-1, 2010.
    • (2010) Dependable and Secure Computing, IEEE Transactions on , Issue.99 , pp. 1
    • Idika, N.1    Bhargava, B.2
  • 18
    • 38149052484 scopus 로고
    • Privilege graph: An extension to the typed access matrix model
    • M. Dacier, Y. Deswarte, "Privilege Graph: an Extension to the Typed Access Matrix Model,"Proc. ESORICS, 1994.
    • (1994) Proc. ESORICS
    • Dacier, M.1    Deswarte, Y.2
  • 19
    • 84988504967 scopus 로고    scopus 로고
    • A graph-based system for network-vulnerability analysis
    • C. Phillips, L.P. Swiler, "A graph-based system for network-vulnerability analysis,"Proc. WNSP'98, pp.71-79.
    • Proc. WNSP'98 , pp. 71-79
    • Phillips, C.1    Swiler, L.P.2
  • 21
    • 84920266699 scopus 로고    scopus 로고
    • Cyber security analytics: A stochastic model for security quantification using absorbing markov chains
    • S. Abraham and S. Nair, "Cyber Security Analytics: A stochastic model for Security Quantification using Absorbing Markov Chains" Journal of Communications 2014, Volume 9 pp 899-907.
    • (2014) Journal of Communications , vol.9 , pp. 899-907
    • Abraham, S.1    Nair, S.2
  • 25
    • 60449090394 scopus 로고    scopus 로고
    • On stochastic modeling for integrated security and dependability evaluation
    • K. Sallhammar, B. Helvik, and S. Knapskog, "On stochastic modeling for integrated security and dependability evaluation," Journal of Networks, vol. 1, 2006.
    • (2006) Journal of Networks , vol.1
    • Sallhammar, K.1    Helvik, B.2    Knapskog, S.3
  • 29
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • Dec
    • W. Arbaugh, W. Fithen, and J. McHugh, "Windows of vulnerability: a case study analysis," Computer, vol. 33, no. 12, pp. 52-59, Dec 2000
    • (2000) Computer , vol.33 , Issue.12 , pp. 52-59
    • Arbaugh, W.1    Fithen, W.2    McHugh, J.3
  • 31
    • 34547974467 scopus 로고    scopus 로고
    • Estimating software vulnerabilities
    • July-Aug
    • J. Jones, "Estimating software vulnerabilities," Security &Privacy,IEEE, vol. 5, no. 4, pp. 28-32, July-Aug. 2007.
    • (2007) Security &Privacy,IEEE , vol.5 , Issue.4 , pp. 28-32
    • Jones, J.1
  • 33
    • 26444448266 scopus 로고    scopus 로고
    • Security in open versus closed systems\-The dance of boltzmann, coase and moore
    • Law and Policy
    • Ross Anderson. Security in open versus closed systems\-The dance of Boltzmann, Coase and Moore. In Proceedings of Open Source Software: Economics, Law and Policy, 2002
    • (2002) Proceedings of Open Source Software: Economics
    • Anderson, R.1
  • 35
    • 14744276335 scopus 로고    scopus 로고
    • Is finding security holes a good idea
    • Eric Rescorla. Is finding security holes a good idea? IEEE Security and Privacy, 3(1):14-19, 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.1 , pp. 14-19
    • Rescorla, E.1
  • 39
    • 37849021677 scopus 로고    scopus 로고
    • Measuring overall security of network configurations using attack graphs
    • August
    • L. Wang, A. Singhal, and S. Jajodia, "Measuring overall security of network configurations using attack graphs," Data and Applications Security XXI, vol. 4602, pp. 98-112, August 2007.
    • (2007) Data and Applications Security XXI , vol.4602 , pp. 98-112
    • Wang, L.1    Singhal, A.2    Jajodia, S.3
  • 40
    • 84874122862 scopus 로고    scopus 로고
    • Analysis of attack graph-based metrics for quantification of network security
    • A. Kundu, N. Ghosh, I. Chokshi and SK. Ghosh, "Analysis of attack graph-based metrics for quantification of network security", India Conference (INDICON), IEEE, pages 530-535, 2012.
    • (2012) India Conference (INDICON), IEEE , pp. 530-535
    • Kundu, A.1    Ghosh, N.2    Chokshi, I.3    Ghosh, S.K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.