This paper is based on a conceptual framework in which security can be split into two generic types of characteristics, behavioral and preventive. Here, preventive security denotes the system's ability to protect itself from external attacks. One way to describe the preventive security of a system is in terms of its interaction with the alleged attacker, i.e., by describing the intrusion process. To our knowledge, very little is done to model this process in quantitative terms. Therefore, based on empirical data collected from intrusion experiments, we have worked out a hypothesis on typical attacker behavior. The hypothesis suggests that the attacking process can be split into three phases: the learning phase, the standard attack phase, an...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most...
This paper is based on a conceptual framework in which security can be split into two generic types ...
This paper is based on a conceptual framework in which security can be split into two generic types ...
This paper describes a security model developed from empirical data collected from a realistic intru...
This paper describes a security model developed fromempirical data collected from a realistic intrus...
Information systems are pervasive in our everyday life. Anyone who is online must deal with the cons...
This paper describes a realistic intrusion experiment intended to investigate whether such experimen...
A new model for intrusion and its propagation through various attack schemes in networks is consider...
Quite often failures in network based services and server systems may not be accidental, but rather ...
Many critical infrastructures such as health care, crisis management and financial systems are part ...
The first part of this thesis describes the results of applying dependability methods to the securit...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
The two experiments described here were intended to investigate the empirical issues that arise from...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most...
This paper is based on a conceptual framework in which security can be split into two generic types ...
This paper is based on a conceptual framework in which security can be split into two generic types ...
This paper describes a security model developed from empirical data collected from a realistic intru...
This paper describes a security model developed fromempirical data collected from a realistic intrus...
Information systems are pervasive in our everyday life. Anyone who is online must deal with the cons...
This paper describes a realistic intrusion experiment intended to investigate whether such experimen...
A new model for intrusion and its propagation through various attack schemes in networks is consider...
Quite often failures in network based services and server systems may not be accidental, but rather ...
Many critical infrastructures such as health care, crisis management and financial systems are part ...
The first part of this thesis describes the results of applying dependability methods to the securit...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
The two experiments described here were intended to investigate the empirical issues that arise from...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most...