Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14365/3533
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKondakçı, Süleyman-
dc.date.accessioned2023-06-16T15:00:44Z-
dc.date.available2023-06-16T15:00:44Z-
dc.date.issued2008-
dc.identifier.isbn9.78077E+12-
dc.identifier.urihttps://doi.org/10.1109/IAS.2008.59-
dc.identifier.urihttps://hdl.handle.net/20.500.14365/3533-
dc.description4th International Symposium on Information Assurance and Security, IAS 2008 -- 8 September 2008 through 10 September 2008 -- Napoli -- 73855en_US
dc.description.abstractThis paper presents a new concept of security assessment methodology while promoting several areas of its application. Attack pattern analysis, network security monitoring locally or remotely are the major application areas of this concept. Instead of testing each asset or a network node separately by applying repetitive attacks and assessments, the composite system generates and executes attacks once, composes risk data, and uses the risk data for the entire network in order to perform the overall assessment. This unique approach can be used as a model to guide development of intrusion detection systems, intelligent network security analysis, monitoring systems, and also as a complementary function in information security test and evaluation laboratories. © 2008 IEEE.en_US
dc.language.isoenen_US
dc.relation.ispartofProceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008en_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectComputer crimeen_US
dc.subjectInterneten_US
dc.subjectNetwork securityen_US
dc.subjectNuclear materials safeguardsen_US
dc.subjectProgram processorsen_US
dc.subjectSecurity of dataen_US
dc.subjectApplication areasen_US
dc.subjectAttack patternsen_US
dc.subjectComposite systemsen_US
dc.subjectInformation securitiesen_US
dc.subjectIntrusion Detection systemsen_US
dc.subjectMonitoring systemsen_US
dc.subjectNetwork nodesen_US
dc.subjectNew conceptsen_US
dc.subjectSecurity assessmentsen_US
dc.subjectSecurity monitoringen_US
dc.subjectIntrusion detectionen_US
dc.titleA composite network security assessmenten_US
dc.typeConference Objecten_US
dc.identifier.doi10.1109/IAS.2008.59-
dc.identifier.scopus2-s2.0-55349129266en_US
dc.authorscopusid15061511300-
dc.identifier.startpage249en_US
dc.identifier.endpage254en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityN/A-
dc.identifier.wosqualityN/A-
item.grantfulltextreserved-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeConference Object-
item.fulltextWith Fulltext-
item.languageiso639-1en-
crisitem.author.dept05.05. Computer Engineering-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Files in This Item:
File SizeFormat 
2624.pdf
  Restricted Access
228.63 kBAdobe PDFView/Open    Request a copy
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

6
checked on Oct 2, 2024

Page view(s)

70
checked on Sep 30, 2024

Download(s)

6
checked on Sep 30, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.