作者
Malik Shahzad Kaleem Awan, Peter Burnap, Omer Rana, Amir Javed
发表日期
2015/8/24
研讨会论文
2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems
页码范围
1442-1447
出版商
IEEE
简介
The dynamic and increasingly stealthy techniques used by cyber criminals to target critical computing infrastructure of an organization requires appropriate response mechanism on the part of the organization. Government agencies and regulatory bodies are imposing the requirements of risk assessments on a continuous basis. One important aspect of continuous risk monitoring is using a suitable risk scoring algorithm, which could help determine a risk score more efficiently. The existing risk scoring mechanism involves subjective and human-based qualitative inputs that are both labour intensive, and result in ambiguous and inconclusive results. We propose a new metric for measuring risk based on objective parameters extracted from real-time traffic logs. The metric has been validated using malicious traffic data pertaining to seven most frequently occurring threats in a network environment. We demonstrate and …
引用总数
2017201820192020202120222023131111
学术搜索中的文章
MSK Awan, P Burnap, O Rana, A Javed - 2015 IEEE 17th International Conference on High …, 2015