語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Network security metrics
~
SpringerLink (Online service)
Network security metrics
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Network security metrics/ by Lingyu Wang, Sushil Jajodia, Anoop Singhal.
作者:
Wang, Lingyu.
其他作者:
Jajodia, Sushil.
出版者:
Cham :Springer International Publishing : : 2017.,
面頁冊數:
xiv, 207 p. :ill., digital ; : 24 cm.;
Contained By:
Springer eBooks
標題:
Computer networks - Security measures. -
電子資源:
http://dx.doi.org/10.1007/978-3-319-66505-4
ISBN:
9783319665054
Network security metrics
Wang, Lingyu.
Network security metrics
[electronic resource] /by Lingyu Wang, Sushil Jajodia, Anoop Singhal. - Cham :Springer International Publishing :2017. - xiv, 207 p. :ill., digital ;24 cm.
1 Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs and Bayesian Networks -- 2 Refining CVSS-based network security metrics by examining the base scores -- 3 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs -- 4 k-Zero day safety: Evaluating the resilience of networks against unknown attacks -- 5 Using Bayesian Networks to Fuse Intrusion Evidences and Detect Zero-day Attack Paths -- 6 Evaluating the network diversity of networks against zero-day attacks -- 7 Metrics suite for network attack graph analytics -- 8 A Novel Metric for Measuring Operational Effectiveness of a Cybersecurity Operations Center.
This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since "you cannot improve what you cannot measure", a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC) Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.
ISBN: 9783319665054
Standard No.: 10.1007/978-3-319-66505-4doiSubjects--Topical Terms:
555385
Computer networks
--Security measures.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Network security metrics
LDR
:03902nam a2200325 a 4500
001
921868
003
DE-He213
005
20171116021018.0
006
m d
007
cr nn 008maaau
008
190624s2017 gw s 0 eng d
020
$a
9783319665054
$q
(electronic bk.)
020
$a
9783319665047
$q
(paper)
024
7
$a
10.1007/978-3-319-66505-4
$2
doi
035
$a
978-3-319-66505-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.W246 2017
100
1
$a
Wang, Lingyu.
$3
1024773
245
1 0
$a
Network security metrics
$h
[electronic resource] /
$c
by Lingyu Wang, Sushil Jajodia, Anoop Singhal.
260
$a
Cham :
$c
2017.
$b
Springer International Publishing :
$b
Imprint: Springer,
300
$a
xiv, 207 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
1 Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs and Bayesian Networks -- 2 Refining CVSS-based network security metrics by examining the base scores -- 3 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs -- 4 k-Zero day safety: Evaluating the resilience of networks against unknown attacks -- 5 Using Bayesian Networks to Fuse Intrusion Evidences and Detect Zero-day Attack Paths -- 6 Evaluating the network diversity of networks against zero-day attacks -- 7 Metrics suite for network attack graph analytics -- 8 A Novel Metric for Measuring Operational Effectiveness of a Cybersecurity Operations Center.
520
$a
This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since "you cannot improve what you cannot measure", a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC) Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer security.
$3
557122
650
1 4
$a
Computer Science.
$3
593922
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Data Encryption.
$3
669790
700
1
$a
Jajodia, Sushil.
$3
675403
700
1
$a
Singhal, Anoop.
$3
1197053
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-66505-4
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入