Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks

P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …

Taxonomy of information security risk assessment (ISRA)

A Shameli-Sendi, R Aghababaei-Barzegar… - Computers & …, 2016 - Elsevier
Abstract Information is a perennially significant business asset in all organizations.
Therefore, it must be protected as any other valuable asset. This is the objective of …

Dynamic optimal countermeasure selection for intrusion response system

A Shameli-Sendi, H Louafi, W He… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Designing an efficient defense framework is challenging with respect to a network's
complexity, widespread sophisticated attacks, attackers' ability, and the diversity of security …

Dynamic risk management response system to handle cyber threats

G Gonzalez-Granadillo, S Dubus, A Motzek… - Future Generation …, 2018 - Elsevier
Appropriate response strategies against new and ongoing cyber attacks must be able to
reduce risks down to acceptable levels, without sacrificing a mission for security. Existing …

Security countermeasures selection using the meta attack language and probabilistic attack graphs

W Wideł, P Mukherjee, M Ekstedt - IEEE Access, 2022 - ieeexplore.ieee.org
Connecting critical infrastructure assets to the network is absolutely essential for modern
industries. In contrast to the apparent advantages, network connectivity exposes other …

Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index

G Gonzalez-Granadillo, J Garcia-Alfaro… - Computers & Electrical …, 2015 - Elsevier
The impact quantification of attacks and security countermeasures is an active research in
the information and communications technology domain. Supporters of the Return On …

Decision-making for intrusion response: Which, where, in what order, and how long?

Y Guo, H Zhang, Z Li, F Li, L Fang… - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Generating fine-grained response policies is a fundamental problem for Intrusion Response
Systems (IRSs). Although existing schemes determine countermeasures and defense points …

Attack graph-based countermeasure selection using a stateful return on investment metric

G Gonzalez-Granadillo, E Doynikova, I Kotenko… - … and Practice of Security …, 2018 - Springer
We propose a mitigation model that evaluates individual and combined countermeasures
against multi-step cyber-attack scenarios. The goal is to anticipate the actions of an attacker …

Selection of Pareto-efficient response plans based on financial and operational assessments

A Motzek, G Gonzalez-Granadillo, H Debar… - EURASIP Journal on …, 2017 - Springer
Finding adequate responses to ongoing attacks on ICT systems is a pertinacious problem
and requires assessments from different perpendicular viewpoints. However, current …

Stateful RORI-based countermeasure selection using hypergraphs

G Gonzalez-Granadillo, E Doynikova… - Journal of Information …, 2020 - Elsevier
Cost-sensitive metrics have been widely used during the past years as financial metrics that
quantify the monetary costs and benefits of security investments, assess risks, and select …