An Attack Graph-Based Probabilistic Security Metric

作者: Lingyu Wang , Tania Islam , Tao Long , Anoop Singhal , Sushil Jajodia

DOI: 10.1007/978-3-540-70567-3_22

关键词: ComputationNetwork securityData miningVulnerability assessmentMetric (mathematics)Interpretation (logic)Theoretical computer scienceHeuristicsAttack graphMathematicsProbabilistic logic

摘要: … , which are usually limited to binary views of security. To fill this gap, we propose a … metric for measuring network security. The metric draws strength from both existing security metrics …

参考文章(32)
Davide Balzarotti, Mattia Monga, Sabrina Sicari, Assessing the risk of using vulnerable components Quality of Protection. pp. 65- 77 ,(2006) , 10.1007/978-0-387-36584-8_6
Lingyu Wang, Anoop Singhal, Sushil Jajodia, Measuring the overall security of network configurations using attack graphs Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security. pp. 98- 112 ,(2007) , 10.1007/978-3-540-73538-0_9
Marc Dacier, Yves Deswarte Mohamed Kaâniche, Quantitative Assessment of Operational Security: Models and Tools * ,(1996)
Eugene H. Spafford, Daniel Farmer, The COPS Security Checker System USENIX Summer. pp. 165- 170 ,(1990)
Lingyu Wang, Anyi Liu, Sushil Jajodia, An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts Computer Security – ESORICS 2005. pp. 247- 266 ,(2005) , 10.1007/11555827_15
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia, Interactive analysis of attack graphs using relational queries Lecture Notes in Computer Science. pp. 119- 132 ,(2006) , 10.1007/11805588_9
M. Dacier, Y. Deswarte, M. Kaâniche, Models and tools for quantitative assessment of operational security information security. pp. 177- 186 ,(1996) , 10.1007/978-1-5041-2919-0_15
Karl Levitt, Dan Zerkle, NetKuang: a multi-host configuration vulnerability checker usenix security symposium. pp. 20- 20 ,(1996)
Michael Howard, Jon Pincus, Jeannette M. Wing, Measuring Relative Attack Surfaces Springer, Boston, MA. pp. 109- 137 ,(2005) , 10.1007/0-387-24006-3_8
Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup, A weakest-adversary security metric for network configuration security analysis Proceedings of the 2nd ACM workshop on Quality of protection - QoP '06. pp. 31- 38 ,(2006) , 10.1145/1179494.1179502