Maximizing network security given a limited budget
The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations
An intelligent search technique for network security administration
International Journal of Artificial Intelligence and Soft Computing
Towards Modelling Information Security with Key-Challenge Petri Nets
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Hi-index | 0.00 |
In this paper, we overview cluster security research underway at Mississippi State University (MSU) and focus on one particular effort involving a process to model system vulnerabilities and possible exploitations in specific cluster environments using exploitation graphs (e-graphs). Cluster security research at MSU has included attacks against clusters, anomaly detection, sensor fusion, VGLI security functionality in clusters, and the use of known system vulnerability data, system configuration data, and vulnerability scanner results to create e-graphs to model possible attack scenarios. The use of e-graphs is helpful in determining attacker work factor analysis, cost/benefit analysis of security, detection of attacks, and identification of critical vulnerabilities.