会议专题

Using Time Patterns to Verify the Utilization of Stochastic Calculus in Security Quantification

With no doubt, keeping a certain level of security for an Information System (IS) is an intriguing as well as a wearisome challenge. It involves not only skillful technicians but also a master plan that will eventually consume a lot of companys resources. Thus, the prime and most difficult concern of any manager is how to deploy his resources so as not to undermine the day-to-day work of the company and, at the same time, achieve the maximum downsizing of risk exposure. The primary objective of this paper is to study the time patterns which characterize the behavior of the technical risk factors that affect an Information System. The output of this research is intended to be used as an input for the model the authors proposed in |2|. The data sources used for our research remain focused on open source vulnerability databases, so as to conserve unbiasedness for the outcomes. At the end, we will be able to provide an unbiased, reliable and quantified risk assessment methodology for the security level of Information Systems.

component time patterns security quantification software vulnerabilities

Nikolaos Alexandris Evangelos Fountas Dimitrios Mermigas Sotirios Pirounias

Department of Informatics, University of Piraeus 80 Karaoli & Dimitrioustr 18534 Piraeus, Greece

国际会议

2010 International Conference on Information Security and Artificial Intelligence(2010年信息安全与人工智能国际会议 ISAI 2010)

成都

英文

1096-1100

2010-12-17(万方平台首次上网日期,不代表论文的发表时间)