000 | 04401nam a22002415i 4500 | ||
---|---|---|---|
999 |
_c32470 _d32470 |
||
001 | 19961528 | ||
010 | _a 2017952946 | ||
020 | _a9783319665047 | ||
040 | _aUOWD | ||
082 | _a005.8 WA NE | ||
100 |
_aWang, Lingyu _910278 |
||
245 | 0 | 0 |
_aNetwork security metrics / _cLingyu Wang, Sushil Jajodia, Anoop Singhal |
260 |
_aCham, Switzerland : _bSpringer, _cc2017. |
||
300 |
_axiv, 207 p. : _bill. ; _c25 cm. |
||
505 | _aPreface; Acknowledgements; Contents; Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs and Bayesian Networks; 1 Introduction; 2 Propagating Attack Probabilities Along Attack Paths; 2.1 Motivating Example; 2.2 Defining the Metric; 2.3 Handling Cycles in Attack Graphs; 3 Bayesian Network-Based Attack Graph Model; 3.1 Representing Attack Graphs Using BNs; 3.2 Comparing to the Previous Approach; 4 Dynamic Bayesian Network-Based Model; 4.1 The General Model; 4.2 Case 1: Inferring Exploit Node Values; 4.3 Case 2: Inferring TGS Node Values; 5 Conclusion. 4.2 Simulation Results5 Conclusion; References; Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs; 1 Introduction; 2 Attack Graphs; 2.1 Tools for Generating Attack Graphs; 3 Past Work in Security Risk Analysis; 4 Common Vulnerability Scoring System (CVSS); 4.1 An Example; 5 Security Risk Analysis of Enterprise Networks Using Attack Graphs; 5.1 Example 1; 5.1.1 Overview; 5.2 Example 2; 5.3 Example 3; 5.4 Using Metrics to Prioritize Risk Mitigation; 6 Challenges; 7 Conclusions; References. K-Zero Day Safety: Evaluating the Resilience of Networks Against Unknown Attacks1 Introduction; 2 Motivating Example; 3 Modeling k-Zero Day Safety; 4 Applying k-Zero Day Safety; 4.1 Redefining Network Hardening; 4.2 Instantiating the Model; 5 Case Study; 5.1 Diversity; 5.2 Known Vulnerability and Unnecessary Service; 5.3 Backup of Asset; 5.4 Firewall; 5.5 Stuxnet and SCADA Security; 6 Conclusion; References; Using Bayesian Networks to Fuse Intrusion Evidences and Detect Zero-Day Attack Paths; 1 Motivation; 2 Rationales and Models; 2.1 Rationales of Using Bayesian Networks. 2.2 Problems of Constructing BN Based on SODG2.3 Object Instance Graph; 3 Instance-Graph-Based Bayesian Networks; 3.1 The Infection Propagation Models; 3.2 Evidence Incorporation; 4 System Overview; 5 Implementation; 6 Evaluation; 6.1 Attack Scenario; 6.2 Experiment Results; 7 Conclusion; References; Evaluating the Network Diversity of Networks Against Zero-DayAttacks; 1 Introduction; 2 Use Cases; 2.1 Use Case 1: Stuxnet and SCADA Security; 2.2 Use Case 2: Worm Propagation; 2.3 Use Case 3: Targeted Attack; 2.4 Use Case 4: MTD; 3 Biodiversity-Inspired Network Diversity Metric. | ||
520 | _aThis book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since “you cannot improve what you cannot measure”, a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. | ||
650 |
_aNetwork security metrics _910279 |
||
650 |
_aNetwork security _99866 |
||
700 |
_aJajodia, Sushil _914679 |
||
700 |
_aSinghal, Anoop _914680 |
||
856 |
_uhttps://uowd.box.com/s/5vnk9zyu38eescpj5fjcd66tyw32exw9 _zLocation Map |
||
942 |
_2ddc _cREGULAR |