2010 International Conference on Network and Service Management 2010
DOI: 10.1109/cnsm.2010.5691334
|View full text |Cite
|
Sign up to set email alerts
|

RiskRank: Security risk ranking for IP flow records

Abstract: This paper proposes RiskRank as a joint measure of cyclical and cross-sectional systemic risk. RiskRank is a general-purpose aggregation operator that concurrently accounts for risk levels for individual entities and their interconnectedness. The measure relies on the decomposition of systemic risk into sub-components that are in turn assessed using a set of risk measures and their relationships. For this purpose, motivated by the development of the Choquet integral, we employ the RiskRank function to aggregat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
10
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 18 publications
1
10
0
Order By: Relevance
“…We use three categories of flow information to formulate this likelihood: timing information, source and destination addresses, and a correlation among flows. The intuition behind the timing information is that a flow is more likely to be the cause of other flows if these flows started shortly after it [2]. Moreover, two flows can exhibit high correlation because a causal relationship exists between them [4].…”
Section: Flow Causalitymentioning
confidence: 99%
See 2 more Smart Citations
“…We use three categories of flow information to formulate this likelihood: timing information, source and destination addresses, and a correlation among flows. The intuition behind the timing information is that a flow is more likely to be the cause of other flows if these flows started shortly after it [2]. Moreover, two flows can exhibit high correlation because a causal relationship exists between them [4].…”
Section: Flow Causalitymentioning
confidence: 99%
“…To evaluate the effectiveness, we perform our risk computation on both these datasets and show that our method assigns high risk scores to the victims and attackers which are involved in the attacks. To evaluate the efficiency, we measure the elapsed time for our approach and two other recent models based on PageRank and HITS [2]. All the experiments were conducted on an iMac PC with 2.00GHz Intel Core 2 Duo processor and 4GB RAM running Ubuntu 12.04 LTS.…”
Section: Experimental Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…This work is related to our previous one [37] but the construction of the dependency does not need any prior knowledge about potential risks in this paper.…”
mentioning
confidence: 96%
“…The closest related work is [25], which is based on random walk and clustering techniques to isolate interaction subgraphs related to P2P communications. Our previous work has leveraged link analysis algorithms on flow dependency graphs [35,36] and host dependency graphs [37] for tracing the root cause flow records corresponding to the malicious traffic. They help to select PageRank as the much suitable algorithm for this paper.…”
Section: Related Workmentioning
confidence: 99%