Predictably Dependable Computing Systems 1995
DOI: 10.1007/978-3-642-79789-7_31
|View full text |Cite
|
Sign up to set email alerts
|

Towards Operational Measures of Computer Security: Experimentation and Modelling

Abstract: Abstract.This paper discusses similarities between reliability and security with the intention of finding probabilistic measures of operational security similar to those that we have for reliability of systems. Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of 'the ability of the system to resist attack', described by the parameter effort.That is, it should reflect the degree to which the system can be expected to remain free of security breaches under particu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

1996
1996
2020
2020

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…However, mature effort-based models that have been proposed are still rare. Using effort as a factor was first discussed by Brocklehurst and Littlewood [19], [20], but they have not suggested a unit or a way to measure effort. Alhazmi et al [21] present a reference formula for testing effort.…”
Section: B Effort-based Modelsmentioning
confidence: 99%
“…However, mature effort-based models that have been proposed are still rare. Using effort as a factor was first discussed by Brocklehurst and Littlewood [19], [20], but they have not suggested a unit or a way to measure effort. Alhazmi et al [21] present a reference formula for testing effort.…”
Section: B Effort-based Modelsmentioning
confidence: 99%
“…A possible way to achieve this is to perform attacking campaigns, during which intruders are encouraged to attack a system, while as much relevant data as possible on the intrusion process are collected [5], [18], [27], [41].…”
Section: Measures Of Behavioural and Preventive Securitymentioning
confidence: 99%
“…For example, if the attackers gain root access on the file-server, they can do virtually anything to the system and the final consequences are impossible to assess completely. In our intrusion experiment, the attackers were told to stop when they had obtained the desired higher privileges, as we did not want them to disturb the work of ordinary system users [20]. In terms of real-time intrusion detection, another reason for concentrating on the immediate result is that it is desirable to detect the intrusion and take preemptive action as early as possible, preferably before any damage is done [10].…”
Section: Intrusion Resultsmentioning
confidence: 99%
“…This section briefly outlines the arrangement of the experiment; for details see Olovsson et al [20]. The target system consisted of a set of 24 SUN ELC diskless workstations connected to one file-server, all running SunOS 4.1.2.…”
Section: The Intrusion Experimentsmentioning
confidence: 99%