A Composite Network Security Assessment
| dc.contributor.author | Kondakçı, Süleyman | |
| dc.date.accessioned | 2023-06-16T15:00:44Z | |
| dc.date.available | 2023-06-16T15:00:44Z | |
| dc.date.issued | 2008-09 | |
| dc.description | 4th International Symposium on Information Assurance and Security, IAS 2008 -- 8 September 2008 through 10 September 2008 -- Napoli -- 73855 | en_US |
| dc.description.abstract | This paper presents a new concept of security assessment methodology while promoting several areas of its application. Attack pattern analysis, network security monitoring locally or remotely are the major application areas of this concept. Instead of testing each asset or a network node separately by applying repetitive attacks and assessments, the composite system generates and executes attacks once, composes risk data, and uses the risk data for the entire network in order to perform the overall assessment. This unique approach can be used as a model to guide development of intrusion detection systems, intelligent network security analysis, monitoring systems, and also as a complementary function in information security test and evaluation laboratories. © 2008 IEEE. | en_US |
| dc.identifier.doi | 10.1109/IAS.2008.59 | |
| dc.identifier.isbn | 9.78E+12 | |
| dc.identifier.scopus | 2-s2.0-55349129266 | |
| dc.identifier.uri | https://doi.org/10.1109/IAS.2008.59 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14365/3533 | |
| dc.language.iso | en | en_US |
| dc.relation.ispartof | Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008 | en_US |
| dc.rights | info:eu-repo/semantics/closedAccess | en_US |
| dc.subject | Computer crime | en_US |
| dc.subject | Internet | en_US |
| dc.subject | Network security | en_US |
| dc.subject | Nuclear materials safeguards | en_US |
| dc.subject | Program processors | en_US |
| dc.subject | Security of data | en_US |
| dc.subject | Application areas | en_US |
| dc.subject | Attack patterns | en_US |
| dc.subject | Composite systems | en_US |
| dc.subject | Information securities | en_US |
| dc.subject | Intrusion Detection systems | en_US |
| dc.subject | Monitoring systems | en_US |
| dc.subject | Network nodes | en_US |
| dc.subject | New concepts | en_US |
| dc.subject | Security assessments | en_US |
| dc.subject | Security monitoring | en_US |
| dc.subject | Intrusion detection | en_US |
| dc.title | A Composite Network Security Assessment | en_US |
| dc.type | Conference Object | en_US |
| dspace.entity.type | Publication | |
| gdc.author.scopusid | 15061511300 | |
| gdc.bip.impulseclass | C5 | |
| gdc.bip.influenceclass | C5 | |
| gdc.bip.popularityclass | C5 | |
| gdc.coar.access | metadata only access | |
| gdc.coar.type | text::conference output | |
| gdc.collaboration.industrial | false | |
| gdc.description.departmenttemp | Kondakci, S., Faculty of Computer Sciences, Izmir University of Economics, 035330 Izmir, Turkey | en_US |
| gdc.description.endpage | 254 | en_US |
| gdc.description.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
| gdc.description.scopusquality | N/A | |
| gdc.description.startpage | 249 | en_US |
| gdc.description.wosquality | N/A | |
| gdc.identifier.openalex | W2170058657 | |
| gdc.index.type | Scopus | |
| gdc.oaire.diamondjournal | false | |
| gdc.oaire.impulse | 1.0 | |
| gdc.oaire.influence | 3.25652E-9 | |
| gdc.oaire.isgreen | false | |
| gdc.oaire.popularity | 1.2681147E-9 | |
| gdc.oaire.publicfunded | false | |
| gdc.oaire.sciencefields | 0202 electrical engineering, electronic engineering, information engineering | |
| gdc.oaire.sciencefields | 02 engineering and technology | |
| gdc.openalex.collaboration | National | |
| gdc.openalex.fwci | 0.7332 | |
| gdc.openalex.normalizedpercentile | 0.78 | |
| gdc.opencitations.count | 4 | |
| gdc.plumx.crossrefcites | 2 | |
| gdc.plumx.mendeley | 13 | |
| gdc.plumx.scopuscites | 6 | |
| gdc.scopus.citedcount | 6 | |
| gdc.virtual.author | Kondakçı, Süleyman | |
| relation.isAuthorOfPublication | 3803a306-2ebf-4571-b717-d5fc214767b5 | |
| relation.isAuthorOfPublication.latestForDiscovery | 3803a306-2ebf-4571-b717-d5fc214767b5 | |
| relation.isOrgUnitOfPublication | b4714bc5-c5ae-478f-b962-b7204c948b70 | |
| relation.isOrgUnitOfPublication | 26a7372c-1a5e-42d9-90b6-a3f7d14cad44 | |
| relation.isOrgUnitOfPublication | e9e77e3e-bc94-40a7-9b24-b807b2cd0319 | |
| relation.isOrgUnitOfPublication.latestForDiscovery | b4714bc5-c5ae-478f-b962-b7204c948b70 |
Files
Original bundle
1 - 1 of 1
