TITLE

An Approach for Internal Network Security Metric Based on Attack Probability

AUTHOR(S)
Shan, Chun; Jiang, Benfu; Xue, Jingfeng; Guan, Fang; Xiao, Na
PUB. DATE
April 2018
SOURCE
Security & Communication Networks;4/24/2018, p1
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
A network security metric may provide quantifiable evidence to assist security practitioners in securing computer networks. However, research on security metrics based on attack graph is not applicable to the characteristics of internal attack; therefore we propose an internal network security metric method based on attack probability. Our approach has the following benefits: it provides the method of attack graph simplification with monitoring event node which could solve the attack graph exponential growth with the network size, while undermining the disguise of internal attacks and improving the efficiency of the entire method; the method of attack probability calculation based on simplified attack graph can simplify the complexity of internal attacks and improve the accuracy of the approach.
ACCESSION #
129266407

 

Related Articles

  • Lawmakers: GAO Cybersecurity Report Shows Need For Their Intervention. Rutherford, Emelie // Defense Daily;10/8/2010, Vol. 248 Issue 6, p7 

    The article reports on U.S president Barack Obama administration's cyber-policy. It states that the lawmakers have asked the U.S. congress to step into strengthen the cybersecurity leadership program. It mentions only 2 out of 24 carried out so far. According to the Department of Homeland...

  • A realistic graph-based alert correlation system. Fredj, Ouissem Ben // Security & Communication Networks;Oct2015, Vol. 8 Issue 15, p2477 

    This paper introduces a graph-based attack description that comes with different analysis methods for alert correlation. The system encompasses an attack scenario detection method, an alert correlation method that recognizes multistep attacks, and graph-based classification method to extract...

  • MADE IN CHINA. "Jack", J. P. // U.S. Naval Institute Proceedings;Apr2011, Vol. 137 Issue 4, p54 

    The article informs that when most of the nations are developing their cyber capabilities, China is developing the most active cyber-attack program of all nations. It has been stated that China's integration of cyber into a wide range of actions has prompted the U.S. to prepare for a wider array...

  • Activity monitoring and database security. Vanhorn, Thomas // Network World;10/8/2007, Vol. 24 Issue 39, p26 

    The article focuses on activity monitoring, which ensures that the database of a company is secure from internal and external attacks. The author inferred that activity monitoring on all types of users is necessary in effectively mitigating risk and protecting database assets from breach and...

  • AN ENEMY WITHOUT BOUNDARIES. Porche III, Isaac R.; Sollinger, Jerry M.; McKay, Shawn // U.S. Naval Institute Proceedings;Oct2012, Vol. 138 Issue 10, p34 

    The article offers comments on the need for a strategy and policy to respond to cyber attack as it is allegedly impossible to block every cyber attack. It is suggested that the industries learn from the vulnerability of the networks attacked while understanding that there is no single defense...

  • As easy as one, two, ten. Kurtz, Paul // SC Magazine: For IT Security Professionals (UK Edition);Jul2004, p26 

    This article presents the steps in creating a solid cybersecurity program. To enable the information technology revolution to reach its full potential, cybersecurity vendors must work with hardware and software vendors to make their products more secure while working with end-users to protect...

  • Firms Vulnerable To Cyberattacks. Investor's Business Daily // Investors Business Daily;4/28/2014, pA08 

    A study says that 52% of U.S. companies have no defenses against targeted cyberattacks.

  • Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis. Nguyen, Thanh H.; Wright, Mason; Wellman, Michael P.; Singh, Satinder // Security & Communication Networks;12/13/2018, p1 

    We study the problem of allocating limited security countermeasures to protect network data from cyber-attacks, for scenarios modeled by Bayesian attack graphs. We consider multistage interactions between a network administrator and cybercriminals, formulated as a security game. This formulation...

  • Out-of-touch IT chiefs leave apps wide open to hackers. Goodwin, Bill // Computer Weekly;9/22/2009, p10 

    The article discusses a study on computer security, published by U.S. security education and research body the Sans Institute and security suppliers Tippingpoint and Qualys. The study is the first to analyse systemically how cybercriminals are breaking into corporate systems. It draws on attack...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics