Attack Modelling and Security Evaluation for Security Information and Event Management

Igor Kotenko, Andrey Chechulin, Evgenia Novikova

2012

Abstract

The paper considers an approach to attack modelling in Security Information and Event Management (SIEM) systems. The suggested approach incorporates usage of service dependency graphs and zero-day vulnerabilities to produce attack graph, calculation of security metrics based on attack graph and service dependencies and advanced any-time techniques for attack graph generation and security evaluation, etc.

Download


Paper Citation


in Harvard Style

Kotenko I., Chechulin A. and Novikova E. (2012). Attack Modelling and Security Evaluation for Security Information and Event Management . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 391-394. DOI: 10.5220/0004063403910394

in Bibtex Style

@conference{secrypt12,
author={Igor Kotenko and Andrey Chechulin and Evgenia Novikova},
title={Attack Modelling and Security Evaluation for Security Information and Event Management},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={391-394},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004063403910394},
isbn={978-989-8565-24-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Attack Modelling and Security Evaluation for Security Information and Event Management
SN - 978-989-8565-24-2
AU - Kotenko I.
AU - Chechulin A.
AU - Novikova E.
PY - 2012
SP - 391
EP - 394
DO - 10.5220/0004063403910394