loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Igor Kotenko and Mikhail Stepashkin

Affiliation: St. Petersburg Institute for Informatics and Automation, Russian Federation

ISBN: 978-972-8865-63-4

Keyword(s): Network attacks, Vulnerability Assessment, Risk Assessment, Security Metrics.

Related Ontology Subjects/Areas/Topics: Data and Systems Security ; Information and Systems Security ; Information Assurance ; Intrusion Detection & Prevention ; Management of Computing Security ; Risk Assessment ; Security in Information Systems ; Security Metrics and Measurement

Abstract: The approach to computer network security analysis intended for using both at design and exploitation stages is suggested. This approach is based on simulation of malefactor’s behavior, generating common attack graphs and calculating different security metrics. The graph represents possible attack scenarios taking into account network configuration, security policy, malefactor’s locations, knowledge level and strategy. The security metrics describe computer network security at different levels of detail and take into account various aspects of security. Attack scenarios model, common attack graph building procedures, used security metrics, and general security level evaluation are defined. The implemented version of the security analysis system is described, and examples of express-evaluations of security level are considered.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.81.29.254

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Kotenko I.; Stepashkin M. and (2006). NETWORK SECURITY EVALUATION BASED ON SIMULATION OF MALFACTOR’S BEHAVIOR.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 339-344. DOI: 10.5220/0002102803390344

@conference{secrypt06,
author={Igor Kotenko and Mikhail Stepashkin},
title={NETWORK SECURITY EVALUATION BASED ON SIMULATION OF MALFACTOR’S BEHAVIOR},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={339-344},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002102803390344},
isbn={978-972-8865-63-4},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - NETWORK SECURITY EVALUATION BASED ON SIMULATION OF MALFACTOR’S BEHAVIOR
SN - 978-972-8865-63-4
AU - Kotenko, I.
AU - Stepashkin, M.
PY - 2006
SP - 339
EP - 344
DO - 10.5220/0002102803390344

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.