作者: Nora Cuppens , Samuel Dubus , Wael Kanoun , Frédéric Cuppens
DOI:
关键词:
摘要: The present invention refers to a method for adapting security policies of an information system infrastructure as function attacks on the by storing potential attacks, their associated risks and curative in data repository, monitoring entering contents representing streams system, detecting at least one attack assessing success probability parameter detected its cost impact parameter, activation policy response deciding activate or deactivate based attack, parameters both policies.