loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Igor Kotenko ; Andrey Chechulin and Evgenia Novikova

Affiliation: St. Petersburg Institute for Informatics and Automation (SPIIRAS), Russian Federation

ISBN: 978-989-8565-24-2

Keyword(s): Attack Modelling, Security Evaluation, Security Information and Event Management Systems, Attack Graph, Service Dependences Graph, Zero Day Vulnerabilities.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Information Assurance ; Risk Assessment ; Security in Information Systems ; Security Metrics and Measurement

Abstract: The paper considers an approach to attack modelling in Security Information and Event Management (SIEM) systems. The suggested approach incorporates usage of service dependency graphs and zero-day vulnerabilities to produce attack graph, calculation of security metrics based on attack graph and service dependencies and advanced any-time techniques for attack graph generation and security evaluation, etc.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 35.172.195.82

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Kotenko, I.; Chechulin, A. and Novikova, E. (2012). Attack Modelling and Security Evaluation for Security Information and Event Management.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 391-394. DOI: 10.5220/0004063403910394

@conference{secrypt12,
author={Igor Kotenko. and Andrey Chechulin. and Evgenia Novikova.},
title={Attack Modelling and Security Evaluation for Security Information and Event Management},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={391-394},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004063403910394},
isbn={978-989-8565-24-2},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Attack Modelling and Security Evaluation for Security Information and Event Management
SN - 978-989-8565-24-2
AU - Kotenko, I.
AU - Chechulin, A.
AU - Novikova, E.
PY - 2012
SP - 391
EP - 394
DO - 10.5220/0004063403910394

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.