An empirical study of a vulnerability metric aggregation method
نویسندگان
چکیده
Quantifying security risk is an important and yet difficult task in enterprise network risk management, critical for proactive mission assurance. Even though metrics exist for individual vulnerabilities, there is currently no standard way of aggregating such metrics. We developed a quantitative model that can be used to aggregate vulnerability metrics in an enterprise network, with a sound computation model. Our model produces quantitative metrics that measure the likelihood that breaches can occur within a given network configuration, taking into consideration the effects of all possible interplays between vulnerabilities. In order to validate the effectiveness (scalability and accuracy) of this approach to realistic networks, we present the empirical study results of the approach on a number of system configurations. We use a real network as the test bed to demonstrate the utility of the approach, show that the sound computation model is crucial for interpreting the metric result. Keywords-enterprise network security; attack graph; vulnerability metrics, quantitative risk assessment
منابع مشابه
Empirical Seismic Vulnerability and Damage of Bottom Frame Seismic Wall Masonry Structure: A Case Study in Dujiangyan (China) Region
In order to understand the seismic performance and mechanism of bottom frame seismic wall masonry structure (BFSWMS) and its vulnerability in empirical seismic damage, based on the statistical and numerical analysis of the field seismic damage observation data of 2178 Dujiangyan structures in the Wenchuan great earthquake urban of China on May 12, 2008, a non-linear function model between the s...
متن کاملAggregating vulnerability metrics in enterprise networks using attack graphs
Quantifying security risk is an important and yet difficult task in enterprise network security management. While metrics exist for individual software vulnerabilities, there is currently no standard way of aggregating such metrics. We present a model that can be used to aggregate vulnerability metrics in an enterprise network, producing quantitative metrics that measure the likelihood breaches...
متن کاملInfluence of initial spatial layout on seismic behavior of masonry buildings with curved roof systems
Early design decisions made on building configuration and spatial design affect seismic behavior of buildings. Therefore introducing design guidelines and empirical methods implemented to assess seismic behavior of buildings have been proposed as an appropriate approach. Such concept helps architects to take into the consideration that how their preliminary design decisions influence downstream...
متن کاملتحمل پریشانی: نظریه، مکانیسم و رابطه با آسیب شناسی روانی
Abstract Distress tolerance refers to the degree to which an individual is able to withstand negative psychological and or physical states. Distress tolerance has increasingly been viewed as an important construct in developing new insights about the onset and maintenance of psycho pathology as well as its prevention and treatment. This article aims to review the theoretical and empirical ba...
متن کاملEvaluation of Groundwater Vulnerability Using Data Mining Technique in Hashtgerd Plain
Groundwater vulnerability assessment would be one of the effective informative methods to provide a basis for determining source of pollution. Vulnerability maps are employed as an important solution in order to handle entrance of pollution into the aquifers. A common way to develop groundwater vulnerability map is DRASTIC. Meanwhile, application of the method is not easy for any aquifer due to...
متن کامل