A Composite Network Security Assessment

dc.contributor.author Kondakçı, Süleyman
dc.date.accessioned 2023-06-16T15:00:44Z
dc.date.available 2023-06-16T15:00:44Z
dc.date.issued 2008-09
dc.description 4th International Symposium on Information Assurance and Security, IAS 2008 -- 8 September 2008 through 10 September 2008 -- Napoli -- 73855 en_US
dc.description.abstract This paper presents a new concept of security assessment methodology while promoting several areas of its application. Attack pattern analysis, network security monitoring locally or remotely are the major application areas of this concept. Instead of testing each asset or a network node separately by applying repetitive attacks and assessments, the composite system generates and executes attacks once, composes risk data, and uses the risk data for the entire network in order to perform the overall assessment. This unique approach can be used as a model to guide development of intrusion detection systems, intelligent network security analysis, monitoring systems, and also as a complementary function in information security test and evaluation laboratories. © 2008 IEEE. en_US
dc.identifier.doi 10.1109/IAS.2008.59
dc.identifier.isbn 9.78E+12
dc.identifier.scopus 2-s2.0-55349129266
dc.identifier.uri https://doi.org/10.1109/IAS.2008.59
dc.identifier.uri https://hdl.handle.net/20.500.14365/3533
dc.language.iso en en_US
dc.relation.ispartof Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008 en_US
dc.rights info:eu-repo/semantics/closedAccess en_US
dc.subject Computer crime en_US
dc.subject Internet en_US
dc.subject Network security en_US
dc.subject Nuclear materials safeguards en_US
dc.subject Program processors en_US
dc.subject Security of data en_US
dc.subject Application areas en_US
dc.subject Attack patterns en_US
dc.subject Composite systems en_US
dc.subject Information securities en_US
dc.subject Intrusion Detection systems en_US
dc.subject Monitoring systems en_US
dc.subject Network nodes en_US
dc.subject New concepts en_US
dc.subject Security assessments en_US
dc.subject Security monitoring en_US
dc.subject Intrusion detection en_US
dc.title A Composite Network Security Assessment en_US
dc.type Conference Object en_US
dspace.entity.type Publication
gdc.author.scopusid 15061511300
gdc.bip.impulseclass C5
gdc.bip.influenceclass C5
gdc.bip.popularityclass C5
gdc.coar.access metadata only access
gdc.coar.type text::conference output
gdc.collaboration.industrial false
gdc.description.departmenttemp Kondakci, S., Faculty of Computer Sciences, Izmir University of Economics, 035330 Izmir, Turkey en_US
gdc.description.endpage 254 en_US
gdc.description.publicationcategory Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı en_US
gdc.description.scopusquality N/A
gdc.description.startpage 249 en_US
gdc.description.wosquality N/A
gdc.identifier.openalex W2170058657
gdc.index.type Scopus
gdc.oaire.diamondjournal false
gdc.oaire.impulse 1.0
gdc.oaire.influence 3.25652E-9
gdc.oaire.isgreen false
gdc.oaire.popularity 1.2681147E-9
gdc.oaire.publicfunded false
gdc.oaire.sciencefields 0202 electrical engineering, electronic engineering, information engineering
gdc.oaire.sciencefields 02 engineering and technology
gdc.openalex.collaboration National
gdc.openalex.fwci 0.7332
gdc.openalex.normalizedpercentile 0.78
gdc.opencitations.count 4
gdc.plumx.crossrefcites 2
gdc.plumx.mendeley 13
gdc.plumx.scopuscites 6
gdc.scopus.citedcount 6
gdc.virtual.author Kondakçı, Süleyman
relation.isAuthorOfPublication 3803a306-2ebf-4571-b717-d5fc214767b5
relation.isAuthorOfPublication.latestForDiscovery 3803a306-2ebf-4571-b717-d5fc214767b5
relation.isOrgUnitOfPublication b4714bc5-c5ae-478f-b962-b7204c948b70
relation.isOrgUnitOfPublication 26a7372c-1a5e-42d9-90b6-a3f7d14cad44
relation.isOrgUnitOfPublication e9e77e3e-bc94-40a7-9b24-b807b2cd0319
relation.isOrgUnitOfPublication.latestForDiscovery b4714bc5-c5ae-478f-b962-b7204c948b70

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
2624.pdf
Size:
228.63 KB
Format:
Adobe Portable Document Format