Non-Homogeneous Stochastic Model for Cyber Security Predictions

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Stochastic Game Model with Imperfect Information in Cyber Security

While there are significant advances in information technology and infrastructure which offer new opportunities, cyberspace is still far from completely secured. Recently, researchers have started exploring the applicability of game theory to address the cyber security problem. The interaction between the attacks and the defense mechanisms can be considered as a game played between the attacker...

متن کامل

Cyber Security Analytics: A Stochastic Model for Security Quantification Using Absorbing Markov Chains

— Most of the current research in security analysis has been centered on identifying threats and vulnerabilities and providing suitable defense mechanisms to improve the robustness of the network and systems. While this approach is attractive, it provides limited insight into understanding the impact these attacks have on the overall security goals of the network and the system. Attack Graph a...

متن کامل

A Semantic Model for Cyber Security

Smart Grid security is challenging as experts in both IT Security and ICS [Industrial Control Systems] systems are few. Expertise in multiple domains is needed, and tools that can be used to analyze smart grid systems during the design phase are nonexistent. We used Semantic Web Technology to create an ontology that is capable of reasoning about security attributes. We used SADL (Semantic Appli...

متن کامل

Predictive Cyber-security Analytics Framework: A non-homogenous Markov model for Security Quantification

Numerous security metrics have been proposed in the past for protecting computer networks. However we still lack effective techniques to accurately measure the predictive security risk of an enterprise taking into account the dynamic attributes associated with vulnerabilities that can change over time. In this paper we present a stochastic security framework for obtaining quantitative measures ...

متن کامل

Beyond the Castle Model of cyber-risk and cyber-security

Article history: Received 13 July 2015 Received in revised form 27 January 2016 Accepted 29 January 2016 Available online xxxx The predominant metaphor for secure computing today is modeled on ever higher, ever better layers of walls. This article explains why that approach is as outmoded for cyber security today as it became for physical security centuries ago. Three forces are undermining the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Security

سال: 2018

ISSN: 2153-1234,2153-1242

DOI: 10.4236/jis.2018.91002