A distributed security tomography framework to assess the exposure of ICT infrastructures to network threats

Journal of Information Security and Applications - Tập 59 - Trang 102833 - 2021
M.A. Brignoli1, A.P. Caforio1, F. Caturano2, M. D’Arienzo3, M. Latini1, W. Matta1, S.P. Romano2, B. Ruggiero2
1Vitrociset, a Leonardo Company, Italy
2University of Napoli “Federico II”, Italy
3Università della Campania, Italy

Tài liệu tham khảo

Lab Kaspersky. What is Cyber-Security? [Online]. Available: https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security [Accessed 26 2018]. Baldoni, 2016 2019 Barrett, 2018 Cambra, 2004 Munir R, Pagna Disso J, Awan I, Rafiq M. Quantitative enterprise network security risk assessment. In: UK performance engineering workshop, 2013. Pendleton, 2016, A survey on systems security metrics, ACM Comput Surv, 49, 1, 10.1145/3005714 Ramos, 2017, Model-based quantitative network security metrics: A survey, IEEE Commun Surv Tutor, 19, 2704, 10.1109/COMST.2017.2745505 Weintraub, 2018, Defining network exposure metrics in security risk scoring models, Int J Adv Comput Sci Appl Tel Aviv, Israel Yusuf, 2017, Composite metrics for network security analysis, J Softw Netw, 137, 10.13052/jsn2445-9739.2017.007 Cybenko, 2013, Quantitative metrics and risk assessment: The three tenets model of cybersecurity, Technol Innov Manag Rev, 3, 15, 10.22215/timreview/712 Cybenko, 2014, Three tenets for secure cyber-physical system design and assessment 2010 Al-Shaer E, Khan L, Ahmed MS. A comprehensive objective network security metric framework for proactive security configuration. In: Proceedings of the 4th annual workshop on cyber security and information intelligence research developing strategies to meet the cyber security and information intelligence challenges ahead - CSIIRW ’08, New York, USA, 2008. Abedin M, Nessa S, Al-Shaer E, Khan L. Vulnerability analysis for evaluating quality of protection of security policies. In: Proceedings of the 2nd ACM workshop on quality of protection - QoP ’06, New York, USA, 2006. ISECOM, 2010 2018 2014, 462 2013 2018 Chew, 2008 2017, 1 ISO/IEC, ISO/IEC 27004, 2016-12-15. 2015 Idika, 2012, Extending attack graph-based security metrics and aggregating their application, IEEE Trans Dependable Secure Comput, 9, 75, 10.1109/TDSC.2010.61 Swiler, 1999 Wang, 2008, An attack graph-based probabilistic security metric, 283 Wang, 2007, Measuring the overall security of network configurations using attack graphs, 98 Cheng, 2014, Metrics of security, in cyber defense and situational awareness, 263, 10.1007/978-3-319-11391-3_13