Scalable Intrusion Prevention Framework based on Attack Graphs

سال انتشار: 1393
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 448

فایل این مقاله در 9 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

CITCONF02_266

تاریخ نمایه سازی: 19 اردیبهشت 1395

چکیده مقاله:

One of the most important challenges in network security is doing intrusion prevention to protect critical assets from serious attacks. But today there is the lack of a widely accepted intrusion prevention system being able of doing network hardening in large real networks. Because of limitation in cost, administrator must be able of doing minimum cost network hardening and the most important problem with existing hardening systems is their inability for enabling the administrator to do cost-benefit tradeoff in selecting the countermeasures. In this paper an intrusion prevention system is proposed that produce countermeasures for network hardening by measuring our defined security metrics. Also our framework can measure the security level improvement of each countermeasure without the need for reconstructing the security model of the network. This feature is the biggest innovation of this paper in comparison with existent solutions that makes the cost-benefit tradeoff applicable in large real networks.

نویسندگان

Marjan keramati

Semnan University, Semnan, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • C. Alexander, " Market Risk Analysis: Quantitative Metthods in Finance", ...
  • Chunlu Wang, Yu Bao, Xuesen Liang, Tianle Zhang, " Vulnerability ...
  • Lingyu Wang _ Massimiliano Albanese Sushil Jajodia, ; Network Hardening, ...
  • M. Albanese, S. Jajodia, and S. Noel, _ 'Time-Efficiet and ...
  • Chen, Feng, Dehui Liu, and Jinshu Su Yi Zhang. " ...
  • Islam, T., and Lingyu Wang. " A Huristic Approach to ...
  • Noel, Steven, Sushil Jajodia, Brian O'Berry, and Michael Jacobs. "Efficient ...
  • Jaquith, "Security Metrics: Replacing Fear, Uncertainty, and Doubt', Addison Wesley ...
  • _ _ (accessed December, 31, 2014) ...
  • Kotenko, E. Doynikova, "Security metrics for risk assessment of distributed ...
  • T Hamed, C Maple, P Sant, _ _ ethodologies to ...
  • Laurent Gallon, :Vulnerability Discrimination Using CVSS Framework?. 4th IFIP International ...
  • H. Joh and Y. K. Malaiya, "Defining and Assessing Quantitative ...
  • _ _ _ -vulnerability-scanc _ 31, ...
  • _ :/nvdnist. _ (accessed December, 31, 2014). ...
  • نمایش کامل مراجع