Modeling TCP throughput: a simple model and its empirical validation
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Bro: a system for detecting network intruders in real-time
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Markovian Model for TCP Analysis in a Differentiated Services Network
QofIS '00 Proceedings of the First COST 263 International Workshop on Quality of Future Internet Services
Algebraic specification of network security risk management
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
An analysis of TCP reset behaviour on the internet
ACM SIGCOMM Computer Communication Review
Comparative Study between Analytical Models and Packet-Level Worm Simulations
Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
Modeling and Simulation in Security Evaluation
IEEE Security and Privacy
A Remote IT Security Evaluation Scheme: A Proactive Approach to Risk Management
IWIA '06 Proceedings of the Fourth IEEE International Workshop on Information Assurance
A monitoring system for detecting repeated packets with applications to computer worms
International Journal of Information Security
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
On scalable attack detection in the network
IEEE/ACM Transactions on Networking (TON)
Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
CONMan: a step towards network manageability
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Proceedings of the 14th ACM conference on Computer and communications security
A multi-part lab exercise for analyzing the effect of peer-to-peer software on a university network
Proceedings of the 8th ACM SIGITE conference on Information technology education
DDoS attack detection method using cluster analysis
Expert Systems with Applications: An International Journal
Information Systems Security
A Composite Network Security Assessment
IAS '08 Proceedings of the 2008 The Fourth International Conference on Information Assurance and Security
Network security simulation and evaluation
CSTST '08 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology
Large-scale network intrusion detection based on distributed learning algorithm
International Journal of Information Security
Experimental comparison of attack trees and misuse cases for security threat identification
Information and Software Technology
Information Systems Security Risk Assessment: Harmonization with International Accounting Standards
CIMCA '08 Proceedings of the 2008 International Conference on Computational Intelligence for Modelling Control & Automation
Implementation and performance evaluation of the RSEP protocol on ARM and intel platforms
Proceedings of the 3rd international conference on Security of information and networks
Network Security Risk Assessment Using Bayesian Belief Networks
SOCIALCOM '10 Proceedings of the 2010 IEEE Second International Conference on Social Computing
An adaptive intrusion detection algorithm based on clustering and kernel-method
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
Intrusion Detection: Towards scalable intrusion detection
Network Security
Hi-index | 0.00 |
This paper presents a new concept for information security assessments while promoting several areas of its application. Threat generation, attack pattern analysis, quantitative risk computation, and network security monitoring locally or remotely are the major application areas of this concept. Instead of testing assets one by one, by applying separate repetitive attacks and assessments, the presented system generates and executes attacks once on a sample group, composes assessment data, and uses the data for the assessment of an entire network. This unique approach can be used as a model to guide the development of tool-based assessment systems, intelligent network security analysis, monitoring systems, and also as a complementary function in information security test and evaluation laboratories. Copyright © 2012 John Wiley & Sons, Ltd.