Method for adapting security policies of an information system infrastructure

作者: Nora Cuppens , Samuel Dubus , Wael Kanoun , Frédéric Cuppens

DOI:

关键词:

摘要: The present invention refers to a method for adapting security policies of an information system infrastructure as function attacks on the by storing potential attacks, their associated risks and curative in data repository, monitoring entering contents representing streams system, detecting at least one attack assessing success probability parameter detected its cost impact parameter, activation policy response deciding activate or deactivate based attack, parameters both policies.

参考文章(9)
Arcady V. Schekochikhin, Narinder Paul, Jay Chaudhry, Kailash Kailash, Srikanth Devarajan, Distributed security provisioning ,(2009)
Vijay Mamtani, Pankaj Parekh, Sandeep Gupta, Saurabh Sarpal, System and method for network quality of service protection on security breach detection ,(2004)
Douglas Wiemer, Bradley Kenneth Mcfarlane, Stanley Taihai Chow, Christophe Gustave, Information system service-level security risk analysis ,(2006)
Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin, Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems 2009 International Conference on Computational Science and Engineering. ,vol. 3, pp. 83- 91 ,(2009) , 10.1109/CSE.2009.233
Allen Hillery, Todd F. Brennan, Parametric content control in a network security system ,(2012)
Salvatore J. Stolfo, Wenke Lee, Matthew Miller, Wei Fan, Methods for cost-sensitive modeling for intrusion detection and response ,(2002)