2018
DOI: 10.1016/j.comcom.2017.12.003
|View full text |Cite
|
Sign up to set email alerts
|

Realtime intrusion risk assessment model based on attack and service dependency graphs

Abstract: Network services are becoming larger and increasingly complex to manage. It is extremely critical to maintain the users QoS, the response time of applications, and critical services in high demand. On the other hand, we see impressive changes in the ways in which attackers gain access to systems and infect services. When an attack is detected, an Intrusion Response System (IRS) is responsible to accurately assess the value of the loss incurred by a compromised resource and apply the proper responses to mitigat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 31 publications
(47 reference statements)
0
3
0
Order By: Relevance
“…This helps to calculate the impact of current attacks and assess future impacts. Shameli-Sendi et al [91] propose a model combining attack graphs and service dependency graphs based on LAMBDA functions. These functions determine the attacker knowledge level and the attack impact on security attributes CIA (confidentiality, integrity, and availability).…”
Section: ) Attack Graphs and Treesmentioning
confidence: 99%
“…This helps to calculate the impact of current attacks and assess future impacts. Shameli-Sendi et al [91] propose a model combining attack graphs and service dependency graphs based on LAMBDA functions. These functions determine the attacker knowledge level and the attack impact on security attributes CIA (confidentiality, integrity, and availability).…”
Section: ) Attack Graphs and Treesmentioning
confidence: 99%
“…Further offensive testing approaches against web applications and networks can be found in Duchene et al (2014), Felderer et al (2016, Sudhodanan et al (2016), andShameli-Sendi et al (2017), respectively. A general introduction and analysis of model-based testing is elaborated in Krämer and Legeard (2016) .…”
Section: Related Workmentioning
confidence: 99%
“…This implies a reduction of testing time but still ensures the ability to identify causes of vulnerabilities. Some other techniques rely on models, either of the application (Krämer and Legeard 2016;Felderer et al 2016) or of the attacks themselves (Duchene et al 2014;Shameli-Sendi et al 2017). A system under test (SUT) is checked regarding whether it behaves in line with its specification using a graphical representation that corresponds to the SUT's expected behavior.…”
Section: Introductionmentioning
confidence: 99%