Security Evaluation

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 92013 Experts worldwide ranked by ideXlab platform

Ze Quan Yan - One of the best experts on this subject based on the ideXlab platform.

Yan Qiang - One of the best experts on this subject based on the ideXlab platform.

Andrey Chechulin - One of the best experts on this subject based on the ideXlab platform.

  • Fast Network Attack Modeling and Security Evaluation based on Attack Graphs
    Journal of Cyber Security and Mobility, 2014
    Co-Authors: Igor Kotenko, Andrey Chechulin
    Abstract:

    The paper suggests an approach to network attack modeling and Security Evaluation which is realized in advanced Security Information and Event Management (SIEM) systems. It is based on modeling of computer network and malefactors’ behaviors, building attack graphs, processing current alerts for real-time adjusting of particular attack graphs, calculating different Security metrics and providing Security assessment procedures. The novelty of the proposed approach is the use of special algorithms for construction, modification and analysis of attack graphs aimed at rapid Security Evaluation. This allows using this approach in SIEM systems that operate in near-real time. The generalized architecture of the Attack Modeling and Security Evaluation Component (AMSEC), as one of the main analytical components of SIEM systems, is outlined. The main components and techniques for attack modeling and Security Evaluation are defined. A prototype of the AMSEC is presented. Experiments with this prototype are evaluated.

  • IDAACS - Computer attack modeling and Security Evaluation based on attack graphs
    2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2013
    Co-Authors: Igor Kotenko, Andrey Chechulin
    Abstract:

    The paper considers an approach to computer attack modeling and Security Evaluation which is suggested to realize in advanced Security Information and Event Management (SIEM) systems. It is based on modeling of malefactors' behavior, building a common attack graph, processing current alerts for real-time adjusting of particular attack graphs, calculating different Security metrics and providing Security assessment procedures. The approach is intended to be implemented in the framework of the EU MASSIF project. The generalized architecture of the Attack Modeling and Security Evaluation Component (AMSEC), as one of the main analytical components of SIEM systems, is outlined. The main components and techniques for attack modeling and Security Evaluation are defined. A prototype of the AMSEC is specified. Experiments with this prototype are analyzed. The prototype makes use of the scenario “Managed Enterprise Service Infrastructures”.

  • common framework for attack modeling and Security Evaluation in siem systems
    IEEE International Conference on Green Computing and Communications, 2012
    Co-Authors: Igor Kotenko, Andrey Chechulin
    Abstract:

    The paper suggests a framework for attack modeling and Security Evaluation in Security Information and Event Management (SIEM) systems. It is supposed that the common approach to attack modeling and Security Evaluation is based on modeling of a malefactor's behavior, generating a common attack graph, calculating different Security metrics and providing risk analysis procedures. Key elements of suggested architectural solutions for attack modeling and Security Evaluation are using a comprehensive Security repository, effective attack graph (tree) generation techniques, taking into account known and new attacks based on zero-day vulnerabilities, stochastic analytical modeling, and interactive decision support to choose preferred Security solutions. The architecture of the Attack Modeling and Security Evaluation Component (AMSEC) is proposed, its interaction with other SIEM components is described. We present the prototype of the component and the results of experiments carried out.

  • GreenCom - Common Framework for Attack Modeling and Security Evaluation in SIEM Systems
    2012 IEEE International Conference on Green Computing and Communications, 2012
    Co-Authors: Igor Kotenko, Andrey Chechulin
    Abstract:

    The paper suggests a framework for attack modeling and Security Evaluation in Security Information and Event Management (SIEM) systems. It is supposed that the common approach to attack modeling and Security Evaluation is based on modeling of a malefactor's behavior, generating a common attack graph, calculating different Security metrics and providing risk analysis procedures. Key elements of suggested architectural solutions for attack modeling and Security Evaluation are using a comprehensive Security repository, effective attack graph (tree) generation techniques, taking into account known and new attacks based on zero-day vulnerabilities, stochastic analytical modeling, and interactive decision support to choose preferred Security solutions. The architecture of the Attack Modeling and Security Evaluation Component (AMSEC) is proposed, its interaction with other SIEM components is described. We present the prototype of the component and the results of experiments carried out.

S L Surana - One of the best experts on this subject based on the ideXlab platform.

Igor Kotenko - One of the best experts on this subject based on the ideXlab platform.

  • A Semantic Model for Security Evaluation of Information Systems
    Journal of Cyber Security and Mobility, 2020
    Co-Authors: Elena Doynikova, Andrey Fedorchenko, Igor Kotenko
    Abstract:

    Modern information systems are characterized by huge Security related data streams. For cyber Security management in such systems, novel models and techniques for efficient processing of these data streams are required. The paper considers development and application of a semantic model for Security Evaluation. The proposed model is represented as the ontology of metrics that is based on the relations between sources of Security related data, primary features of initial Security data and goals of Security Evaluation. The set of hierarchically interconnected Security metrics is mapped to the data features and Security Evaluation goals. The relations between these metrics within the proposed ontology provide the basis for Security Evaluation technique. The paper introduces the proposed ontology and its foundations, and briefly describes the developed technique. The analysis of data in the open sources is conducted, and the case study is provided to show applicability of the approach.

  • Fast Network Attack Modeling and Security Evaluation based on Attack Graphs
    Journal of Cyber Security and Mobility, 2014
    Co-Authors: Igor Kotenko, Andrey Chechulin
    Abstract:

    The paper suggests an approach to network attack modeling and Security Evaluation which is realized in advanced Security Information and Event Management (SIEM) systems. It is based on modeling of computer network and malefactors’ behaviors, building attack graphs, processing current alerts for real-time adjusting of particular attack graphs, calculating different Security metrics and providing Security assessment procedures. The novelty of the proposed approach is the use of special algorithms for construction, modification and analysis of attack graphs aimed at rapid Security Evaluation. This allows using this approach in SIEM systems that operate in near-real time. The generalized architecture of the Attack Modeling and Security Evaluation Component (AMSEC), as one of the main analytical components of SIEM systems, is outlined. The main components and techniques for attack modeling and Security Evaluation are defined. A prototype of the AMSEC is presented. Experiments with this prototype are evaluated.

  • IDAACS - Computer attack modeling and Security Evaluation based on attack graphs
    2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2013
    Co-Authors: Igor Kotenko, Andrey Chechulin
    Abstract:

    The paper considers an approach to computer attack modeling and Security Evaluation which is suggested to realize in advanced Security Information and Event Management (SIEM) systems. It is based on modeling of malefactors' behavior, building a common attack graph, processing current alerts for real-time adjusting of particular attack graphs, calculating different Security metrics and providing Security assessment procedures. The approach is intended to be implemented in the framework of the EU MASSIF project. The generalized architecture of the Attack Modeling and Security Evaluation Component (AMSEC), as one of the main analytical components of SIEM systems, is outlined. The main components and techniques for attack modeling and Security Evaluation are defined. A prototype of the AMSEC is specified. Experiments with this prototype are analyzed. The prototype makes use of the scenario “Managed Enterprise Service Infrastructures”.

  • common framework for attack modeling and Security Evaluation in siem systems
    IEEE International Conference on Green Computing and Communications, 2012
    Co-Authors: Igor Kotenko, Andrey Chechulin
    Abstract:

    The paper suggests a framework for attack modeling and Security Evaluation in Security Information and Event Management (SIEM) systems. It is supposed that the common approach to attack modeling and Security Evaluation is based on modeling of a malefactor's behavior, generating a common attack graph, calculating different Security metrics and providing risk analysis procedures. Key elements of suggested architectural solutions for attack modeling and Security Evaluation are using a comprehensive Security repository, effective attack graph (tree) generation techniques, taking into account known and new attacks based on zero-day vulnerabilities, stochastic analytical modeling, and interactive decision support to choose preferred Security solutions. The architecture of the Attack Modeling and Security Evaluation Component (AMSEC) is proposed, its interaction with other SIEM components is described. We present the prototype of the component and the results of experiments carried out.

  • GreenCom - Common Framework for Attack Modeling and Security Evaluation in SIEM Systems
    2012 IEEE International Conference on Green Computing and Communications, 2012
    Co-Authors: Igor Kotenko, Andrey Chechulin
    Abstract:

    The paper suggests a framework for attack modeling and Security Evaluation in Security Information and Event Management (SIEM) systems. It is supposed that the common approach to attack modeling and Security Evaluation is based on modeling of a malefactor's behavior, generating a common attack graph, calculating different Security metrics and providing risk analysis procedures. Key elements of suggested architectural solutions for attack modeling and Security Evaluation are using a comprehensive Security repository, effective attack graph (tree) generation techniques, taking into account known and new attacks based on zero-day vulnerabilities, stochastic analytical modeling, and interactive decision support to choose preferred Security solutions. The architecture of the Attack Modeling and Security Evaluation Component (AMSEC) is proposed, its interaction with other SIEM components is described. We present the prototype of the component and the results of experiments carried out.