You are here

Attack Graph Based Security Metrics: State of the Art

Journal Name:

Publication Year:

Abstract (2. Language): 
In this paper, we discussed the development of Attack Graph-Based Security Metrics that will be used to evaluate the security of a network. Attack Graph-Based Security Metrics recently used simultaneously to form a Multiple Attack Graph-Based Security Metrics. Furthermore, Multiple Attack Graph-Based Security Metrics were used to evaluate the two networks so it can be inferred which network is more secure than other one.
18-21

REFERENCES

References: 

[1] L. Hayden, “IT Security Metrics,” The McGraw-Hill Companies, New
York, 2010.
[2] A. Jaquith, “Security metrics : replacing fear, uncertainty, and doubt,”
Pearson Education, Inc., 2007.
[3] S.M. Furnell, S. Katsikas, J. Lopez, A. Patel, “Securing Information and
Communications Systems: Principles, Technologies, and Applications,”
Artech House, Inc., 2008.
[4] J.M. Kizza, “A Guide to Computer Network Security,” Springer-Verlag
London Limited, 2009
[5] A. Yautsiukhin, “A Framework for Quantitative Security Analysis of
Complex Business Systems” PhD Dissertation, International Doctorate
School in Information and Communication Technologies (DIT),
University of Trento, 2009.
[6] N.C. Idika, “Characterizing and Aggregating Attack Graph-Based
Security Metrics,” PhD Dissertation, Purdue University, West Lafayette,
Indiana, 2010.
[7] A. Ozment, “Vulnerability Discovery & Software Security,” PhD
Dissertation, University of Cambridge, 2007.
[8] H. Langweg, “Software Security Metrics for Malware Resilience,” PhD
Dissertation, Bonn University, 2007.
[9] M.Y. Liu, “Quantitative Security Analysis for Service-Oriented
Software Architectures,” PhD Dissertation, Department of Electrical and
Computer Engineering, University of Victoria, 2008.
[10] S.E. Schechter, “Computer Security Strength & Risk: A Quantitative
Approach,” PhD Dissertation, The Division of Engineering and Applied
Sciences, Harvard University, 2004.
[11] L. Krautsevich, F. Martinelli, A. Yautsiukhin, “Formal approach to
security metrics: What does “more secure” mean for you?,” IEEE Paper,
IEEE/ASME International Conference on Mechatronic and Embedded
Systems and Application, 2010.
[12] R. Lippmann, K. Ingols, C. Scott, Piwowarski, K. Kratkiewicz, M. Artz,
R. Cunningham, “Validating and restoring defense in depth using attack
graphs,” Military Communications Conference, October 2006.
[13] L. Wang, A. Singhal, S. Jajodia, “Measuring overall security of network
configurations using attack graphs,” Data and Applications Security
XXI, vol. 4602, pp. 98–112, August 2007.
[14] L. Wang, T. Islam, T. Long, A. Singhal, S. Jajodia, “An attack graph-based probabilistic security metric,” DAS 2008, LNCS 5094, pp. 283–
296, 2008.
[15] F. Chen, A. Liu, Y. Zhang, J. Su, “A Scalable Approach to Analyzing
Network Security using Compact Attack Graph,” JOURNAL OF
NETWORKS, VOL. 5, NO. 5, 2010.
[16] K. Ingols, M. Chu, R. Lippmann, S. Webster, S. Boyer, “Modeling
Modern Network Attacks and Countermeasures Using Attack Graphs,”
Annual Computer Security Applications Conference (ACSAC) 25th.,
2009.
[17] H. Patel, “Intrusion Alerts Analysis Using Attack Graphs and
Clustering,” San Jose State University, 2009.
[18] J. Homer, A. Varikuti, X. Ou, M.A. McQueen, “Improving Attack
Graph Visualization Through Data Reduction and Attack Grouping,”
Workshop on Visualization for Computer Security (VizSEC) 2008.
[19] M.S. Ahmed, E. Al-Shaer, E. Khan, “A novel quantitative approach for
measuring network security,” Proceedings of IEEE INFO COM 2008.
[20] T.W. Purboyo, B. Rahardjo, Kuspriyanto, “Security Metrics: A Brief
Survey,” Proc. of 2011 International Conference ICICI-BME, Bandung,
8-9 Nov. 2011.
[21] Irawati, T.W. Purboyo, “Developing Computer Program for Computing
Eigen pairs of 2x2 Matrices and 3x3 Upper Triangular Matrices Using
The Simple Algorithm,” Far East Journal of Mathematical Sciences
(FJMS), Volume 56, Issue 2, p. 185-200, September 2011.
[22] N. Idika, B. Marshall, B. Bhargava, “Maximizing Security given a
Limited Budget,” Proc. TAPIA ’09: Richard Tapia Celebration of
Diversity in Computing, Apr. 2009.
[23] T.W. Purboyo, B. Rahardjo, Kuspriyanto, I.M. Detiena, “A New Metrics
for Predicting Network Security Level,” Journal of Global Research in
Computer Science (JGRCS), Vol. 3 No. 3 p. 68-72, March 2012.
[24] T.W. Purboyo, Kuspriyanto, “New Non Path Metrics for Evaluating
Network Security Based on Vulnerability,” International Journal of
Computer Science Issues, Volume 9, Issue 4, July 2012.

Thank you for copying data from http://www.arastirmax.com