Biblio
Filters: Keyword is effectiveness evaluation [Clear All Filters]
Analysis of Attack Effectiveness Evaluation of AD hoc Networks based on Rough Set Theory. 2021 17th International Conference on Computational Intelligence and Security (CIS). :489—492.
.
2021. This paper mainly studies an attack effectiveness evaluation method for AD hoc networks based on rough set theory. Firstly, we use OPNET to build AD hoc network simulation scenario, design and develop attack module, and obtain network performance parameters before and after the attack. Then the rough set theory is used to evaluate the attack effectiveness. The results show that this method can effectively evaluate the performance of AD hoc networks before and after attacks.
Mathematical Model For Information Security System Effectiveness Evaluation Against Advanced Persistent Threat Attacks. 2020 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF). :1—5.
.
2020. The article deals with the mathematical model for information security controls optimization and evaluation of the information security systems effectiveness. Distinctive features of APT attacks are given. The generalized efficiency criterion in which both the requirements of the return of security investment maximization and the return on attack minimization are simultaneously met. The generalized reduced gradient method for solving the optimization of the objective function based on formulated efficiency criterion is proposed.
A Model for Analyzing the Effectiveness of Moving Target Defense. Proceedings of the 8th International Conference on Communication and Network Security. :17–21.
.
2018. Moving target defense(MTD) is a typical proactive cyber defense technology, which not only increases the difficulty of the attacker, but also reduces the damage caused by successful attacks. A number of studies have assessed the defensive effectiveness of MTD, but only focus on increasing the difficulty of attacks. No studies have been conducted to assess the impact of successful attacks on the network. In this paper, we propose a probability model that evaluates the impact of MTD against subsequent stages of complete attack process. The model quantify the probability distribution of the number of compromised hosts. The results of simulation show that MTD can reduce the number of compromised hosts, and attackers cannot control all hosts.