2014
DOI: 10.12720/jcm.9.12.899-907
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Analytics: A Stochastic Model for Security Quantification Using Absorbing Markov Chains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 49 publications
(38 citation statements)
references
References 13 publications
0
38
0
Order By: Relevance
“…A Markov chain is regarded as one of the best modeling techniques that has been used effectively in various fields such as reliability analysis [14], performance analysis, dependability analysis [15] [16], and cybersecurity analysis [17], among others. We will model the host access attack graph described in the previous subsection using a Markov chain with the real behavior of the attacker in conjunction with the Markovian properties.…”
Section: Markov Chainmentioning
confidence: 99%
“…A Markov chain is regarded as one of the best modeling techniques that has been used effectively in various fields such as reliability analysis [14], performance analysis, dependability analysis [15] [16], and cybersecurity analysis [17], among others. We will model the host access attack graph described in the previous subsection using a Markov chain with the real behavior of the attacker in conjunction with the Markovian properties.…”
Section: Markov Chainmentioning
confidence: 99%
“…Then the procedure of detection of the object ) ,..., During the study, the results of which are described in the work (Khan, Awad, & Thuraisingham, 2007) (Al-Jarrah, 2014) (Abraham & Nair, 2014), it was justified that the most Petrenko T. Adaptive system for detection of cyber-attacks Published: Janury 2017 MESTE │81…”
Section: The Model Of Logical Procedures Of Detection Of Anomalies Anmentioning
confidence: 99%
“…In [34,35], the authors established the cyber-security analytics framework where we have captured all the processes involved in building our security metric framework. In [36,37] the extended the model to factor in the age of the vulnerabilities that are part of the generated Attack Tree.…”
Section: Predictive Cyber Security Frameworkmentioning
confidence: 99%
“…For example, in our approach, we utilize an Absorbing Markov chain for performing exploitability analysis. In [34,35] we discussed how we can model an attack-graph as a discrete time absorbing Markov chain where the absorbing state represents the security goal being compromised.…”
Section: Predictive Cyber Security Frameworkmentioning
confidence: 99%