Computer attack modeling and security evaluation based on attack graphs

I Kotenko, A Chechulin - 2013 IEEE 7th International …, 2013 - ieeexplore.ieee.org
The paper considers an approach to computer attack modeling and security evaluation
which is suggested to realize in advanced Security Information and Event Management …

Common framework for attack modeling and security evaluation in SIEM systems

I Kotenko, A Chechulin - 2012 IEEE International Conference …, 2012 - ieeexplore.ieee.org
The paper suggests a framework for attack modeling and security evaluation in Security
Information and Event Management (SIEM) systems. It is supposed that the common …

A cyber attack modeling and impact assessment framework

I Kotenko, A Chechulin - 2013 5th International Conference on …, 2013 - ieeexplore.ieee.org
The paper suggests a framework for cyber attack modeling and impact assessment. It is
supposed that the common approach to attack modeling and impact assessment is based …

Fast network attack modeling and security evaluation based on attack graphs

I Kotenko, A Chechulin - Journal of Cyber Security and …, 2014 - journals.riverpublishers.com
The paper suggests an approach to network attack modeling and security evaluation which
is realized in advanced Security Information and Event Management (SIEM) systems. It is …

[PDF][PDF] Attack modeling and security evaluation in SIEM systems

I Kotenko, A Chechulin - International Transactions on Systems Science …, 2012 - siwn.org.uk
The paper suggests a framework for attack modeling and security evaluation in Security
Information and Event Management (SIEM) systems applicable for future systems of the …

[PDF][PDF] Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing.

IV Kotenko, E Doynikova - J. Wirel. Mob. Networks Ubiquitous Comput …, 2014 - isyou.info
The paper is devoted to the security assessment problem. Authors suggest an approach to
the security assessment based on the attack graphs that can be implemented in …

Security metrics based on attack graphs for the Olympic Games scenario

I Kotenko, E Doynikova… - 2014 22nd Euromicro …, 2014 - ieeexplore.ieee.org
Analysis of security risks and calculation of security metrics is an important task for Security
Information and Events Management (SIEM) systems. It allows recognizing the current …

Countermeasure selection in SIEM systems based on the integrated complex of security metrics

I Kotenko, E Doynikova - 2015 23rd Euromicro International …, 2015 - ieeexplore.ieee.org
The paper considers a technique for countermeasure selection in security information and
event management (SIEM) systems. The developed technique is based on the suggested …

[PDF][PDF] Analyzing network security using malefactor action graphs

I Kotenko, M Stepashkin - International Journal of Computer …, 2006 - researchgate.net
The approach to network security analysis is suggested. It is based on simulation of
malefactor's behavior, generating attack graph and calculating different security metrics. The …

Dynamical calculation of security metrics for countermeasure selection in computer networks

I Kotenko, E Doynikova - 2016 24th Euromicro International …, 2016 - ieeexplore.ieee.org
The paper considers the issue of countermeasures selection for ongoing computer network
attacks. The suggested technique is based on the countermeasure model that was defined …