A novel quantitative approach for measuring network security

被引:0
|
作者
Ahmed, Mohammad Salim [1 ]
Al-Shaer, Ehab [2 ]
Khan, Latifur [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Dallas, TX 75230 USA
[2] De Paul Univ, Sch Comp Sci Telecommun & Informat Syst, Chicago, IL USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design securing countermeasures, to choose between alternative security architectures, and to systematically modify security configurations in order to improve security. However, the security of a network depends on a number of dynamically changing factors such as emergence of new vulnerabilities and threats, policy, structure and network traffic. Identifying, quantifying and validating these factors using security metrics is a major challenge in this area. In this paper, we propose a novel security metric framework that identifies and quantities objectively the most significant security risk factors, which include existing vulnerabilities, historical trend of vulnerability of the remotely accessible services, prediction of potential vulnerabilities for any, general network service and their estimated severity and finally polio, resistance to attack propagation within the network. We then describe our rigorous validation experiments using real-life vulnerability data of the past 6 years from National Vulnerability Database (NVD) to show the high accuracy and confidence of the proposed metrics. Some previous works have considered vulnerabilities using code analysis. However, as far as we know. this is the first work to study and analyze these metrics for network security evaluation using publicly available vulnerability information and security policy configuration.
引用
收藏
页码:76 / 80
页数:5
相关论文
共 50 条
  • [1] A Novel Comprehensive Network Security Assessment Approach
    Wang, Chunlu
    Wang, Yancheng
    Dong, Yingfei
    Zhang, Tianle
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [2] A Flexible Approach to Measuring Network Security Using Attack Graphs
    Chen Feng
    Su Jin-Shu
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 426 - 431
  • [3] A QUANTITATIVE, EXPERIMENTAL APPROACH TO MEASURING PROCESSOR SIDE-CHANNEL SECURITY
    Demme, John
    Martin, Robert
    Waksman, Adam
    Sethumadhavan, Simha
    [J]. IEEE MICRO, 2013, 33 (03) : 68 - 77
  • [4] An Experimental Approach to Network Monitoring Using Quantitative Security Metrics
    El-Hassan, Fadi
    Matrawy, Ashraf
    Seddigh, Nabil
    Nandy, Biswajit
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (01): : 48 - 62
  • [5] A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
    Casola, Valentina
    De Benedictis, Alessandra
    Rak, Massimiliano
    Villano, Umberto
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 163
  • [6] A Novel Quantitative Approach to Concept Analysis The Internomological Network
    Cook, Paul F.
    Larsen, Kai R.
    Sakraida, Teresa J.
    Pedro, Leli
    [J]. NURSING RESEARCH, 2012, 61 (05) : 369 - 378
  • [7] A Novel Predication Approach for Network Security Situation Inspired by Immunity
    Shi Yuan-quan
    Li Tao
    Chen Wen
    Zhang Rui-rui
    [J]. INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 849 - 855
  • [8] Network Security Metrics: Vital Ingredients for Measuring Networks Security
    Bindra, Naveen
    Sood, Manu
    [J]. 2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 221 - 226
  • [9] A novel approach for integrating security policy enforcement with dynamic network virtualization
    Basile, Cataldo
    Lioy, Antonio
    Pitscheider, Christian
    Valenza, Fulvio
    Vallini, Marco
    [J]. 2015 1ST IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT), 2015,
  • [10] A quantitative evaluation model for network security
    Man, Dapeng
    Yang, Wu
    Yang, Yongtian
    Wang, Wei
    Zhang, Lejun
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 773 - 777