作者: Nizar Kheir , Nora Cuppens-Boulahia , Frédéric Cuppens , Hervé Debar
DOI: 10.1007/978-3-642-15497-3_38
关键词:
摘要: Recent advances in intrusion detection and prevention have brought promising solutions to enhance IT security. Despite these efforts, the battle with cyber attackers has reached a deadlock. While always try unveil new vulnerabilities, security experts are bounded keep their softwares compliant latest updates. Intrusion response systems thus relegated second rank because no one trusts them modify system configuration during runtime. Current cost evaluation techniques do not cover all impact aspects, favoring availability over confidentiality integrity. They profit from findings which led powerful models including vulnerability graphs, exploit etc. This paper bridges gap between service dependency that used for evaluation. It proposes representation enables The outcome is model complete methodology use this order evaluate costs. latter covers collateral damages positive effects as they reduce