Tabu Search
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Workshop-based Multiobjective Security Safeguard Selection
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Defense trees for economic evaluation of security investments
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Minimum-cost network hardening using attack graphs
Computer Communications
Optimal security hardening using multi-objective optimization on attack tree models of networks
Proceedings of the 14th ACM conference on Computer and communications security
Research on Network Risk Assessment Based on Attack Probability
IWCSE '09 Proceedings of the 2009 Second International Workshop on Computer Science and Engineering - Volume 02
Decision Support Systems - Special issue: Intelligence and security informatics
A Visualisation Technique for the Identification of Security Threats in Networked Systems
IV '10 Proceedings of the 2010 14th International Conference Information Visualisation
An Analytical Evaluation of Network Security Modelling Techniques Applied to Manage Threats
BWCCA '10 Proceedings of the 2010 International Conference on Broadband, Wireless Computing, Communication and Applications
Approximating the pareto front of multi-criteria optimization problems
TACAS'10 Proceedings of the 16th international conference on Tools and Algorithms for the Construction and Analysis of Systems
SP 800-30. Risk Management Guide for Information Technology Systems
SP 800-30. Risk Management Guide for Information Technology Systems
Selection of optimal countermeasure portfolio in IT security planning
Decision Support Systems
Hi-index | 0.00 |
Budget cuts and the high demand in strengthening the security of computer systems and services constitute a challenge. Poor system knowledge and inappropriate selection of security measures may lead to unexpected financial and data losses. This paper proposes a novel Risk Assessment and Optimisation Model (RAOM) to solve a security countermeasure selection problem, where variables such as financial cost and risk may affect a final decision. A Multi-Objective Tabu Search (MOTS) algorithm has been developed to construct an efficient frontier of non-dominated solutions, which can satisfy organisational security needs in a cost-effective manner.