Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks
暂无分享,去创建一个
Sushil Jajodia | Lingyu Wang | Anoop Singhal | Massimiliano Albanese | Mengyuan Zhang | S. Jajodia | A. Singhal | Lingyu Wang | Mengyuan Zhang | Massimiliano Albanese
[1] S. Bhatkar,et al. Data Space Randomization , 2008, DIMVA.
[2] Sushil Jajodia,et al. Toward measuring network security using attack graphs , 2007, QoP '07.
[3] Alysson Neves Bessani,et al. OS diversity for intrusion tolerance: Myth or reality? , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).
[4] Sushil Jajodia,et al. Measuring network security using dynamic bayesian network , 2008, QoP '08.
[5] Tom Leinster,et al. Measuring diversity: the importance of species similarity. , 2012, Ecology.
[6] Eric Totel,et al. COTS Diversity Based Intrusion Detection and Application to Web Servers , 2005, RAID.
[7] Debin Gao,et al. Behavioral Distance Measurement Using Hidden Markov Models , 2006, RAID.
[8] Sencun Zhu,et al. Improving sensor network immunity under worm attacks: A software diversity approach , 2016, Ad Hoc Networks.
[9] Charles C. Elton,et al. The Ecology of Invasions by Animals and Plants. , 1959 .
[10] Vincent Nicomette,et al. The Design of a Generic Intrusion-Tolerant Architecture for Web Servers , 2009, IEEE Transactions on Dependable and Secure Computing.
[11] Jia Wang,et al. Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects? , 2008, NDSS.
[12] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[13] Edward J. McCluskey,et al. A Design Diversity Metric and Analysis of Redundant Systems , 2002, IEEE Trans. Computers.
[14] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[15] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[16] Sushil Jajodia,et al. Measuring the Overall Security of Network Configurations Using Attack Graphs , 2007, DBSec.
[17] Mathias Ekstedt,et al. Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[18] Sushil Jajodia,et al. Time-efficient and cost-effective network hardening using attack graphs , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).
[19] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[20] Nora Cuppens-Boulahia,et al. A Service Dependency Model for Cost-Sensitive Intrusion Response , 2010, ESORICS.
[21] Bharat K. Bhargava,et al. Extending Attack Graph-Based Security Metrics and Aggregating Their Application , 2012, IEEE Transactions on Dependable and Secure Computing.
[22] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[23] Charles C. Elton. The Ecology of Invasions by Animals and Plants , 1959, Biodiversity & Conservation.
[24] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[25] Bev Littlewood,et al. Redundancy and Diversity in Security , 2004, ESORICS.
[26] Sushil Jajodia,et al. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities , 2014, IEEE Transactions on Dependable and Secure Computing.
[27] Scott Shenker,et al. Diverse Replication for Single-Machine Byzantine-Fault Tolerance , 2008, USENIX Annual Technical Conference.
[28] Bart Preneel,et al. Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings , 2010, ESORICS.
[29] Bev Littlewood,et al. Modeling software design diversity: a review , 2001, CSUR.
[30] Roy A. Maxion,et al. Use of diversity as a defense mechanism , 2005, NSPW '05.
[31] Pavel Laskov,et al. Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings , 2022, International Conference on Detection of intrusions and malware, and vulnerability assessment.
[32] David Evans,et al. N-Variant Systems: A Secretless Framework for Security through Diversity , 2006, USENIX Security Symposium.
[33] Jeannette M. Wing,et al. An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.
[34] W. Marsden. I and J , 2012 .
[35] Karen Scarfone,et al. Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.
[36] Sushil Jajodia,et al. k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks , 2010, ESORICS.
[37] Gail-Joon Ahn,et al. Data and Applications Security XXI , 2007 .
[38] Dieter Gollmann,et al. Computer Security – ESORICS 2004 , 2004, Lecture Notes in Computer Science.
[39] Jason P. Jue,et al. Minimum-color path problems for reliability in mesh networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[40] M. Hill. Diversity and Evenness: A Unifying Notation and Its Consequences , 1973 .