Estimating Target Distribution in security assessment models
Title | Estimating Target Distribution in security assessment models |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Weintraub, E. |
Conference Name | 2017 IEEE 2nd International Verification and Security Workshop (IVSW) |
Publisher | IEEE |
ISBN Number | 978-1-5386-1708-3 |
Keywords | business data processing, Computational modeling, Computers, cyber-attacks, Damage Assessment, Databases, distributed computing, distributed processing, Information security, Monitoring, network security assessment models, Organizations, pubcrawl, real-time system configuration, Real-time Systems, resilience, Resiliency, security, security assessment, security monitoring system, security of data, Standards organizations, target distribution, Vulnerability |
Abstract | Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive knowledge. This work is aimed at defining a formula which enables measuring quantitatively the attacked components' distribution. The proposed formula is based on the real-time configuration of the system. Using the proposed measure, firms can quantify damages, allocate appropriate budgets to actual real risks and build their configuration while taking in consideration the risks impacted by components' distribution. The formula is demonstrated as part of a security continuous monitoring system. |
URL | https://ieeexplore.ieee.org/document/8031549/ |
DOI | 10.1109/IVSW.2017.8031549 |
Citation Key | weintraub_estimating_2017 |
- pubcrawl
- Vulnerability
- target distribution
- Standards organizations
- security of data
- security monitoring system
- security assessment
- security
- Resiliency
- resilience
- real-time systems
- real-time system configuration
- business data processing
- Organizations
- network security assessment models
- Monitoring
- information security
- distributed processing
- distributed computing
- Databases
- Damage Assessment
- cyber-attacks
- Computers
- Computational modeling