2010
DOI: 10.1007/978-3-642-15497-3_38
|View full text |Cite
|
Sign up to set email alerts
|

A Service Dependency Model for Cost-Sensitive Intrusion Response

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
67
0
3

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 76 publications
(70 citation statements)
references
References 14 publications
0
67
0
3
Order By: Relevance
“…This countermeasure blocks all online users and has a big impact on QoS. In the second place, we see countermeasures cm 40 = BlockAllT raf f ic(vF W ), cm 43 = Disconnect(CloudServer3), and cm 45 = Shutdown(CloudServer3) on dp 4 . Each of these countermeasures disconnects the relationship between services and DB service.…”
Section: Security Impact On Service Quality Evaluationmentioning
confidence: 93%
See 2 more Smart Citations
“…This countermeasure blocks all online users and has a big impact on QoS. In the second place, we see countermeasures cm 40 = BlockAllT raf f ic(vF W ), cm 43 = Disconnect(CloudServer3), and cm 45 = Shutdown(CloudServer3) on dp 4 . Each of these countermeasures disconnects the relationship between services and DB service.…”
Section: Security Impact On Service Quality Evaluationmentioning
confidence: 93%
“…As explained, they do not use the same measurement unit [1], [25]. Some models attempt to put these two costs in the same measurement unit by simplifying the problem [4]- [6]. For example, Balepin et al [6] propose to consider only availability loss of services affected by the intruder and countermeasure.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Return on response investment (RORI) is a quantitative model for ranking response plans by a cost-sensitive financial comparison and has been introduced in [7][8][9]19], and in the following. For the scope of this article, we consider sets of individual actions performed as a response to an adversary.…”
Section: Return On Response Investmentmentioning
confidence: 99%
“…The proposed model considers different kinds of dependencies between services, and derives quantitative differences between system states from these graphs. Kheir et al [13] propose a service dependency graph to evaluate the confidentiality and integrity impacts, as well as the availability impact. The confidentiality and integrity criteria are not considered in [12].…”
Section: Related Workmentioning
confidence: 99%