2005
DOI: 10.1007/11596981_57
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
4
3
3

Relationship

2
8

Authors

Journals

citations
Cited by 41 publications
(37 citation statements)
references
References 6 publications
0
37
0
Order By: Relevance
“…In [8], a game-theoretic method is used to compute probabilities of expected attacker behavior and these probabilities are used in a transition matrix model to assess security in an interconnected system. In [9], Arnes et al propose a real-time risk assessment method for information systems and networks based on IDS. The system risk is dynamically evaluated using hidden Markov models, providing a mechanism for handling data from sensors with different levels of trustworthiness.…”
Section: Related Workmentioning
confidence: 99%
“…In [8], a game-theoretic method is used to compute probabilities of expected attacker behavior and these probabilities are used in a transition matrix model to assess security in an interconnected system. In [9], Arnes et al propose a real-time risk assessment method for information systems and networks based on IDS. The system risk is dynamically evaluated using hidden Markov models, providing a mechanism for handling data from sensors with different levels of trustworthiness.…”
Section: Related Workmentioning
confidence: 99%
“…The degrees of severities of the different states are obtained from a knowledge base subsystem which extensively explores historical data and expert assessments. The real-time risk R t w for a specific worker w at time t is thus quantified by the following equation [33]: Rtw=false∑i=1Nfalse∑j=1Miptw(i,j)×C(i,j), where p t w ( i , j ) is the probability that the worker w is in safety state j associated with hazard i at time t , C ( i , j ) is the cost value (severity) of state j associated with hazard i , N is the number of hazards, and M i is the number of safety states associated with hazard i .…”
Section: Risk Assessment Framework Of Rtsramentioning
confidence: 99%
“…MDPs are related to the types of stochastic models already popular in contemporary dependability/security research [3,4,5,6]. Their focus is to assume that the model parameters (e.g., state transition probabilities & costs) in each decision stage depend explicitly on the control action taken in that stage.…”
Section: Figure 1 An Intrusion Tolerant Systemmentioning
confidence: 99%