A Hierarchical Detriment Evaluation Method of Security Incidents Based on Service Correlation

Article Preview

Abstract:

Internet is inundated with large amount of intrusion, attack and other security incidents, which have posed a serious threat to network security. Security evaluation is one of the important management means throughout the life cycle of information system; it is also a basis and premise of formulating and adjusting the security strategies. Accurately predicting the impending security incidents and evaluating the possible degree of detriment are the decision-making foundation in network security defense. In this paper, a hierarchical detriment evaluation method of security incidents is put forward, after direct detriment is calculated ,indirect detriment of the incidents is calculated based on service dependence and permission transfer relations, and then, the overall detriment of security incidents is obtained.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

5981-5985

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] DOD, TCSEC. Trusted computer system evaluation criteria. DoD 5200. 28-STD, 1985. 83.

DOI: 10.21236/ada253989

Google Scholar

[2] ITSEC. Information Technology Security Evaluation Criteria. (1991).

Google Scholar

[3] Infrastructure, P.K. and T.P. Profile, Common Criteria for Information Technology Security Evaluation. National Security Agency, (2002).

Google Scholar

[4] GB/T 20984-2007. Information security technology-risk assessment specification for information security. (2007).

Google Scholar

[5] HE Hui, et al., Detriment quantitative assessment of the network security incidents[J]. Journal of harbin institute of technolofy, 2012. 44(5): pp.66-70.

Google Scholar

[6] Wu Hua, et al., Threaten quantitative and analyse of a large-scale network security events [J]. Microcomputer information, 2008. 24(3): pp.44-46.

Google Scholar

[7] Saaty T. Modeling unstructured decision problem: A theory of analytical hierarchies[C] /Proc the first international conference on mathematical modeling, 1977, 69-77.

Google Scholar