Динамическое оценивание защищенности компьютерных сетей в SIEM-системах
Аннотация
Ключевые слова
Полный текст:
PDFЛитература
1. MASSIF FP7 Project. Mаnagement of Security information and events in Service Infrastructures. http://www.massifproject.eu.
2. Kotenko I., Stepashkin M. Network Security Evaluation based on Simulation of Malefactor's Behavior // SECRYPT 2006. International Conference on Security and Cryptography. Proceedings. Portugal. 7-10 August 2006. P.339-344.
3. Котенко И.В., Степашкин М.В., Богданов В.С. Архитектуры и модели компонентов активного анализа защищенности на основе имитации действий злоумышленников // Проблемы информационной безопасности. Компьютерные системы. 2006, № 2, С.7-24.
4. Kotenko I., Chechulin A. Common Framework for Attack Modeling and Security Evaluation in SIEM Systems // 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing. Besançon, France, September 11-14, 2012. Los Alamitos, California. IEEE Computer Society. 2012. P. 94-101.
5. Ruiz J.F., Harjani R., Maña A., Desnitsky V., Kotenko I., Chechulin A. A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components // Proceedings - 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2012 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2012. Garching, 2012. С.261-268.
6. Mayer A. Operational Security Risk Metrics: Definitions, Calculations, Visualizations // Metricon 2.0. CTO RedSeal Systems, 2007.
7. The Center for Internet Security, The CIS Security Metrics, 2009.
8. Kheir N., Cuppens-Boulahia N., Cuppens F., Debar H. A service dependency model for cost-sensitive intrusion response // Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS'10), 2010. P. 626-642.
9. Poolsappasit N., Dewri R., Ray I. Dynamic security risk management using Bayesian attack graphs // IEEE Transactions on Dependable and Security Computing, 2012. Vol.9, No.1. P.61-74. Dantu R., Kolan P., Cangussu J. Network risk management using attacker profiling // Security and Communication Networks, 2009. Vol.2, No.1. P. 83–96.
10. Kotenko I., Stepashkin M. Attack graph based evaluation of network security // Proceedings of the 10th IFIP Conference on Communications and Multimedia Security (CMS'2006). Heraklion, Greece, 2006. P. 216-227.
11. Manadhata P.K., Wing J.M. An attack surface metric // IEEE Transactions on Software Engineering, 2010. P. 371-386.
12. Wang L., Singhal A., Jajodia S., Noel S. k-zero day safety: measuring the security risk of networks against unknown attacks // Proceedings of the 15th European conference on Research in computer security, Springer-Verlag Berlin, Heidelberg, 2010. P. 573-587.
13. Swanson M., Bartol, N., Sabato J., Hash J., Graffo L. Security Metrics Guide for Information Technology Systems. NIST Special Publication 800-55, Jul. 2003.
14. Axelrod C. W. Accounting for Value and Uncertainty in Security Metrics. Information Systems Control Journal, 2008. Vol.6, P.1-6.
15. Mell P., Scarfone K., Romanosky S. A Complete Guide to the Common Vulnerability Scoring System Version 2.0, 2007.
16. Kotenko I., Chechulin A. A Cyber Attack Modeling and Impact Assessment Framework // Proceedings of the 5th International Conference on Cyber Conflict 2013 (CyCon 2013). IEEE and NATO COE Publications. Tallinn, Estonia, 2013. P.119142.
Ссылки
- На текущий момент ссылки отсутствуют.

Это произведение доступно по лицензии Creative Commons «Attribution» («Атрибуция») 4.0 Всемирная.