2009
DOI: 10.1016/j.cose.2009.01.002
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic model checking for the quantification of DoS security threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 6 publications
0
16
0
Order By: Relevance
“…Probably the most closely related work is that of [2], where PRISM is used to systematically quantify DoS (Denial of Service) security threats. In [1], Hidden Markov Models are used to develop anomaly-based intrusion detection systems.…”
Section: B Validation Of Results and Runtime Statisticsmentioning
confidence: 99%
See 2 more Smart Citations
“…Probably the most closely related work is that of [2], where PRISM is used to systematically quantify DoS (Denial of Service) security threats. In [1], Hidden Markov Models are used to develop anomaly-based intrusion detection systems.…”
Section: B Validation Of Results and Runtime Statisticsmentioning
confidence: 99%
“…RELATED WORK In related work, a number of researchers have deployed probabilistic model checking to analyze threat levels in computer systems and security protocols [9], [16], [14], [2].…”
Section: B Validation Of Results and Runtime Statisticsmentioning
confidence: 99%
See 1 more Smart Citation
“…This fact makes probabilistic model checking a promising approach towards quantitative analysis of protocols [13,25]. The importance of enabling quantitative analysis for a given cryptographic protocol was first shown in [26].…”
Section: Related Workmentioning
confidence: 99%
“…This allows further optimizations of the MI intruder behavior based on known security principles [15,20,21,22,23], as well as implementation of custom behavior that will enable model checking requirements beyond those expressed as safety guarantees (i.e. secrecy and authentication).…”
Section: The MI Intruder Model In Usementioning
confidence: 99%