A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior

@article{Jonsson1997AQM,
  title={A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior},
  author={Erland Jonsson and Tomas Olovsson},
  journal={IEEE Trans. Software Eng.},
  year={1997},
  volume={23},
  pages={235-245}
}
This paper is based on a conceptual framework in which security can be split into two generic types of characteristics, behavioral and preventive. Here, preventive security denotes the system’s ability to protect itself from external attacks. One way to describe the preventive security of a system is in terms of its interaction with the alleged attacker, i.e., by describing the intrusion process. To our knowledge, very little is done to model this process in quantitative terms. Therefore, based… CONTINUE READING
Highly Influential
This paper has highly influenced 15 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 273 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 182 extracted citations

Assessing Security to Compare Architecture Alternatives of Component-Based Systems

2015 IEEE International Conference on Software Quality, Reliability and Security • 2015
View 6 Excerpts
Highly Influenced

A Large-Scale Study of the Time Required to Compromise a Computer System

IEEE Transactions on Dependable and Secure Computing • 2014
View 6 Excerpts
Highly Influenced

Moving Targets: Security and Rapid-Release in Firefox

ACM Conference on Computer and Communications Security • 2014
View 4 Excerpts
Highly Influenced

Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks

IEEE Transactions on Dependable and Secure Computing • 2012
View 9 Excerpts
Highly Influenced

Quantifying Information Leakage for Fully Probabilistic Systems

2010 10th IEEE International Conference on Computer and Information Technology • 2010
View 4 Excerpts
Highly Influenced

274 Citations

02040'96'01'07'13'19
Citations per Year
Semantic Scholar estimates that this publication has 274 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 13 references

An Empirical Model of the Security Intrusion Process

E. Jonsson, T. Olovsson
COMPASS ’96, Proc. 11th Ann. Conf. Computer Assurance, June 17–21, NIST, Gaithersburg, Md., pp.176–186, ISBN 0-7803-3390-X, IEEE Computer Society, 1996. • 1996
View 1 Excerpt

On measurement of operational security

IEEE Aerospace and Electronic Systems Magazine • 1994
View 2 Excerpts

Questions and Answers about Tiger Teams

P. D. Goldis
ED- PACS, The EDP Audit, Control and Security Newsletter, vol. 27, no. 4, pp. 1–10, Oct. 1989. • 1989
View 2 Excerpts

Make the tigers hunt for you

Computers & Security • 1988
View 2 Excerpts

Similar Papers

Loading similar papers…