Normal view MARC view ISBD view

Network security metrics /

By: Wang, Lingyu
Title By: Jajodia, Sushil | Singhal, Anoop
Material type: BookPublisher: Cham, Switzerland : Springer, c2017.Description: xiv, 207 p. : ill. ; 25 cm.ISBN: 9783319665047Subject(s): Network security metrics | Network securityDDC classification: 005.8 WA NE Online resources: Location Map
Summary:
This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since “you cannot improve what you cannot measure”, a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Status Notes Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
005.8 WA NE (Browse shelf) Available April 2018 T0057838
Total holds: 0

Preface; Acknowledgements; Contents; Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs and Bayesian Networks; 1 Introduction; 2 Propagating Attack Probabilities Along Attack Paths; 2.1 Motivating Example; 2.2 Defining the Metric; 2.3 Handling Cycles in Attack Graphs; 3 Bayesian Network-Based Attack Graph Model; 3.1 Representing Attack Graphs Using BNs; 3.2 Comparing to the Previous Approach; 4 Dynamic Bayesian Network-Based Model; 4.1 The General Model; 4.2 Case 1: Inferring Exploit Node Values; 4.3 Case 2: Inferring TGS Node Values; 5 Conclusion. 4.2 Simulation Results5 Conclusion; References; Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs; 1 Introduction; 2 Attack Graphs; 2.1 Tools for Generating Attack Graphs; 3 Past Work in Security Risk Analysis; 4 Common Vulnerability Scoring System (CVSS); 4.1 An Example; 5 Security Risk Analysis of Enterprise Networks Using Attack Graphs; 5.1 Example 1; 5.1.1 Overview; 5.2 Example 2; 5.3 Example 3; 5.4 Using Metrics to Prioritize Risk Mitigation; 6 Challenges; 7 Conclusions; References. K-Zero Day Safety: Evaluating the Resilience of Networks Against Unknown Attacks1 Introduction; 2 Motivating Example; 3 Modeling k-Zero Day Safety; 4 Applying k-Zero Day Safety; 4.1 Redefining Network Hardening; 4.2 Instantiating the Model; 5 Case Study; 5.1 Diversity; 5.2 Known Vulnerability and Unnecessary Service; 5.3 Backup of Asset; 5.4 Firewall; 5.5 Stuxnet and SCADA Security; 6 Conclusion; References; Using Bayesian Networks to Fuse Intrusion Evidences and Detect Zero-Day Attack Paths; 1 Motivation; 2 Rationales and Models; 2.1 Rationales of Using Bayesian Networks. 2.2 Problems of Constructing BN Based on SODG2.3 Object Instance Graph; 3 Instance-Graph-Based Bayesian Networks; 3.1 The Infection Propagation Models; 3.2 Evidence Incorporation; 4 System Overview; 5 Implementation; 6 Evaluation; 6.1 Attack Scenario; 6.2 Experiment Results; 7 Conclusion; References; Evaluating the Network Diversity of Networks Against Zero-DayAttacks; 1 Introduction; 2 Use Cases; 2.1 Use Case 1: Stuxnet and SCADA Security; 2.2 Use Case 2: Worm Propagation; 2.3 Use Case 3: Targeted Attack; 2.4 Use Case 4: MTD; 3 Biodiversity-Inspired Network Diversity Metric.

This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since “you cannot improve what you cannot measure”, a network security metric is essential to evaluating the relative effectiveness of potential network security solutions.

The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective.

Powered by Koha