作者: R. Ortalo , Y. Deswarte , M. Kaaniche
DOI: 10.1109/32.815323
关键词: Security service 、 Standard of Good Practice 、 Asset (computer security) 、 Risk analysis (engineering) 、 Computer science 、 Reliability engineering 、 Covert channel 、 Information security audit 、 Vulnerability 、 Network security policy 、 Security through obscurity 、 Information security 、 Logical security 、 Security testing 、 Cloud computing security 、 Operations security 、 Computer security model 、 Software security assurance 、 Exploit 、 Security information and event management
摘要: This paper presents the results of an experiment in security evaluation. The system is modeled as a privilege graph that exhibits its vulnerabilities. Quantitative measures estimate effort attacker might expend to exploit these vulnerabilities defeat objectives are proposed. A set tools has been developed compute such and used monitor large real for nearly two years. experimental presented validity discussed. Finally, practical usefulness operational monitoring shown comparison with other existing approaches given.