2016
DOI: 10.1002/nem.1956
|View full text |Cite
|
Sign up to set email alerts
|

Security novel risk assessment framework based on reversible metrics: a case study of DDoS attacks on an E‐commerce web server

Abstract: Summary Network security management is a complex and costly task. This is due to the diversity and the large number of assets to protect from potential threats. It is difficult for enterprises to ensure complete security of their information technology resources. They need to give priority to critical and vulnerable assets. Thus, for each asset, they assess the risks associated with various threats. Then, depending on risk level, they can decide which asset needs a particular security treatment. In this paper,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 30 publications
0
6
0
Order By: Relevance
“…We propose to classify the value of each metric (standard and proposed) before aggregating them. We use the following scale: low (00), medium (01), high (10), or excellent (11). Then, we use the bit alternation method (see Figure 3) to obtain a unique binary sequence that will be converted into a decimal value.…”
Section: Selection Of the Deep Learning Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…We propose to classify the value of each metric (standard and proposed) before aggregating them. We use the following scale: low (00), medium (01), high (10), or excellent (11). Then, we use the bit alternation method (see Figure 3) to obtain a unique binary sequence that will be converted into a decimal value.…”
Section: Selection Of the Deep Learning Methodsmentioning
confidence: 99%
“…In order to comprehend the risk assessment method, it is first necessary to understand a few fundamental concepts 11 Risk model: In this work, we will be inspired by the model presented in Reference 11, we will extend and adapt it to our needs. The risk is viewed as a tree of parameters (Figure 2).…”
Section: Proposed Systemmentioning
confidence: 99%
See 3 more Smart Citations