Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14365/3533
Title: | A composite network security assessment | Authors: | Kondakçı, Süleyman | Keywords: | Computer crime Internet Network security Nuclear materials safeguards Program processors Security of data Application areas Attack patterns Composite systems Information securities Intrusion Detection systems Monitoring systems Network nodes New concepts Security assessments Security monitoring Intrusion detection |
Abstract: | This paper presents a new concept of security assessment methodology while promoting several areas of its application. Attack pattern analysis, network security monitoring locally or remotely are the major application areas of this concept. Instead of testing each asset or a network node separately by applying repetitive attacks and assessments, the composite system generates and executes attacks once, composes risk data, and uses the risk data for the entire network in order to perform the overall assessment. This unique approach can be used as a model to guide development of intrusion detection systems, intelligent network security analysis, monitoring systems, and also as a complementary function in information security test and evaluation laboratories. © 2008 IEEE. | Description: | 4th International Symposium on Information Assurance and Security, IAS 2008 -- 8 September 2008 through 10 September 2008 -- Napoli -- 73855 | URI: | https://doi.org/10.1109/IAS.2008.59 https://hdl.handle.net/20.500.14365/3533 |
ISBN: | 9.78077E+12 |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
2624.pdf Restricted Access | 228.63 kB | Adobe PDF | View/Open Request a copy |
CORE Recommender
SCOPUSTM
Citations
6
checked on Nov 20, 2024
Page view(s)
76
checked on Nov 18, 2024
Download(s)
6
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.