2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP) 2016
DOI: 10.1109/pdp.2016.96
|View full text |Cite
|
Sign up to set email alerts
|

Dynamical Calculation of Security Metrics for Countermeasure Selection in Computer Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 27 publications
(25 citation statements)
references
References 18 publications
0
25
0
Order By: Relevance
“…To date, more than 100 000 vulnerabilities for more than 60 000 hardware and software products have been found. Vulnerability databases, as databases of a particular type of security data, are used in vulnerability scanners [29], Web application firewalls [32], and also applied in conjunction with other security information to evaluate network infrastructure security by attack modeling [1,18,19] and risk assessment [9,21].…”
Section: Security Sources and Related Workmentioning
confidence: 99%
“…To date, more than 100 000 vulnerabilities for more than 60 000 hardware and software products have been found. Vulnerability databases, as databases of a particular type of security data, are used in vulnerability scanners [29], Web application firewalls [32], and also applied in conjunction with other security information to evaluate network infrastructure security by attack modeling [1,18,19] and risk assessment [9,21].…”
Section: Security Sources and Related Workmentioning
confidence: 99%
“…The dynamic countermeasure selection technique was presented earlier by Kotenko and Doynikova. 6 This paper discloses the steps of the technique in detail. The common approach, applied metrics, and techniques are outlined in the next section.…”
Section: Related Workmentioning
confidence: 99%
“…New elements of the suggested solutions that were not presented earlier are as follows: modified integrated security metrics taxonomy; dynamic model of the metrics calculation, definition of security level and selection of countermeasures. The paper is an extended version of the paper presented at the 24th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP'16) 6 : we extended the review of the related works; we added a detailed description of the suggested techniques for the metrics calculation and of the models that are used for these calculations; we clarified the technique of the countermeasure selection; and we extended the description of the developed security assessment and countermeasure selection system and of the experiments.…”
Section: Introductionmentioning
confidence: 99%
“…Some research works has been conducted in the assessment of security measures. Kotenko et al [12,13], e.g., propose a framework for cyber attack modeling and impact assessment based on attack graph generation, real-time event analysis techniques, prognosis of future malefactor steps, attack impact assessment, and anytime approach for attack graph building and analysis. We differ from these research as we do not propose new algorithms or methods of attack graph construction, instead, we propose a novel framework that processes input data to generate response plans for pre-defined threat scenarios.…”
Section: Related Workmentioning
confidence: 99%