DocumentCode
3052995
Title
An Analytical Evaluation of Network Security Modelling Techniques Applied to Manage Threats
Author
Viduto, Valentina ; Maple, Carsten ; Huang, Wei
Author_Institution
Inst. for Res. in Applicable Comput., (IRAC), Univ. of Bedfordshire, Luton, UK
fYear
2010
fDate
4-6 Nov. 2010
Firstpage
117
Lastpage
123
Abstract
The current ubiquity of information coupled with the reliance on such data by businesses has led to a great deal of resources being deployed to ensure the security of this information. Threats can come from a number of sources and the dangers from those insiders closest to the source have increased significantly recently. This paper focuses on techniques used to identify and manage threats as well as the measures that every organisation should consider to put into action. A novel game-based onion skin model has been proposed, combining techniques used in theory-based and hardware-based hardening strategies.
Keywords
computer network security; game based onion skin model; hardware based hardening strategy; information security; network security modelling technique; theory based hardening strategy; threat identification; threat management; Analytical models; Biological system modeling; Data models; Hardware; Monitoring; Risk management; Security; Attack graph; Attack tree; Network hardening; Threats;
fLanguage
English
Publisher
ieee
Conference_Titel
Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on
Conference_Location
Fukuoka
Print_ISBN
978-1-4244-8448-5
Electronic_ISBN
978-0-7695-4236-2
Type
conf
DOI
10.1109/BWCCA.2010.58
Filename
5633801
Link To Document