Proceedings of the 2014 Symposium and Bootcamp on the Science of Security 2014
DOI: 10.1145/2600176.2600184
|View full text |Cite
|
Sign up to set email alerts
|

A new approach to modeling and analyzing security of networked systems

Abstract: Modeling and analyzing security of networked systems is an important problem in the emerging Science of Security and has been under active investigation. In this paper, we propose a new approach towards tackling the problem. Our approach is inspired by the shock model and random environment techniques in the Theory of Reliability, while accommodating security ingredients. To the best of our knowledge, our model is the first that can accommodate a certain degree of adaptiveness of attacks, which substantially w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
23
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
1

Relationship

5
3

Authors

Journals

citations
Cited by 24 publications
(24 citation statements)
references
References 33 publications
1
23
0
Order By: Relevance
“…We compute equilibrium infection probability i * v numerically by solving Eqs. (5) for v ∈ V via the BB package in the R system. We compute the upper and lower bounds, namely i * − and i * + v , according to Proposition 1.…”
Section: Approximating Equilibrium Infection Probabilities In Er and mentioning
confidence: 99%
“…We compute equilibrium infection probability i * v numerically by solving Eqs. (5) for v ∈ V via the BB package in the R system. We compute the upper and lower bounds, namely i * − and i * + v , according to Proposition 1.…”
Section: Approximating Equilibrium Infection Probabilities In Er and mentioning
confidence: 99%
“…This framework builds on a large body of literature across Computer Science, Mathematics and Statistical Physics (cf. [7,4,33,37,38,17,39,29,6,3,28,23,11,12] and the references therein), which can be further traced back to the century-old studies on biological epidemic models [19,13,8].…”
Section: Related Workmentioning
confidence: 96%
“…where In is the identity matrix of size n. Note that M as defined in Eq. (3) is the coefficient matrix of linear system (4). The stability of equilibrium B * = σ is determined by the eigenvalues of matrix M .…”
Section: Existence and Stability Of Equilibriamentioning
confidence: 99%
See 1 more Smart Citation
“…For example, the effectiveness of antimalware tools (e.g., the false positive rate or false negative rate) is often measured based on malware samples collected during a period of time (e.g., one year), while ignoring their instantaneous evolution over time. Taking one step further from static metrics, time-dependent security metrics have been studied to characterize and quantify system states at different times, such as the proportion of compromised computers in a network [6], [7], [8], [9], [10], [11], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42].…”
Section: B Dynamic Security Metrics Vs Agility Metricsmentioning
confidence: 99%