2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications 2011
DOI: 10.1109/trustcom.2011.7
|View full text |Cite
|
Sign up to set email alerts
|

Estimates of Success Rates of Denial-of-Service Attacks

Abstract: Denial-of-service (DoS) attacks are an imminent and real threat to many enterprises. Decision makers in these enterprises need be able to assess the risk associated with such attacks and to make decisions regarding measures to put in place to increase the security posture of their systems. Experiments, simulations and analytical research have produced data related to DoS attacks. However, these results have been produced for different environments and are difficult to interpret, compare, and aggregate for the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…The main advantage of this approach is that it does not require expensive and time-consuming deployment of experiments, and therefore, can be used to provide a relatively quick input. For example, Sommestad et al report the results of employing the experts' judgements to obtain such complex estimations as success rates of code execution [142] and denialof-service attacks [143], effectiveness of intrusion detective systems [144], to name a few. The disadvantage will be that the use of expert estimates introduces (potentially large) uncertainties.…”
Section: Discussionmentioning
confidence: 99%
“…The main advantage of this approach is that it does not require expensive and time-consuming deployment of experiments, and therefore, can be used to provide a relatively quick input. For example, Sommestad et al report the results of employing the experts' judgements to obtain such complex estimations as success rates of code execution [142] and denialof-service attacks [143], effectiveness of intrusion detective systems [144], to name a few. The disadvantage will be that the use of expert estimates introduces (potentially large) uncertainties.…”
Section: Discussionmentioning
confidence: 99%
“…The number of respondents to these surveys varies between four and 165 individuals. In four of the five surveys ( [46][47][48][49]), the respondents' judgment was weighted using Cooke's classical method [50], a well-established method for weighting domain experts based on their ability to accurately assess a set of test questions on the same topic as the real questions. The effectiveness of the method is demonstrated in [50].…”
Section: ) Probabilistic Uncertain Dependenciesmentioning
confidence: 99%
“…Taxonomies that describe the field can be found in the works of Laprie et al (2004) and Hansman and Hunt (2005). This project studies four of the more important domains: intrusion detection systems (Study A) (Sommestad et al, ), denial of service attacks (Study B) (Sommestad et al, 2011), arbitrary code execution attacks (Study C) (Sommestad et al, 2012a) and software vulnerability discovery (Study D) (Sommestad et al, 2012b). As discussing these matters is out of scope for the paper, the interested reader is referred to the references in this section for further information.…”
Section: Expert Judgement In Four Studiesmentioning
confidence: 99%