Integrated Repository of Security Information for Network Security Evaluation

@article{Fedorchenko2015IntegratedRO,
  title={Integrated Repository of Security Information for Network Security Evaluation},
  author={A. Fedorchenko and I. Kotenko and A. Chechulin},
  journal={J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  year={2015},
  volume={6},
  pages={41-57}
}
Security evaluation systems usually use various information sources to estimate computer network security. One of the important tasks in these systems is integration and storage of information from various sources. The paper is devoted to investigation and development of models and methods to integrate open security databases into one repository. The model of integration proposed in the paper helps to improve the accuracy of attack detection systems. As sources for security information… Expand
A Semantic Model for Security Evaluation of Information Systems
Centralized vulnerability database for organization specific automated vulnerabilities discovery and supervision
AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection
Research on Building Exploitable Vulnerability Database for Cloud-Native App
Data Encryption Method Using Environmental Secret Key with Server Assistance
Investigation of DDoS Attacks by Hybrid Simulation
...
1
2
...

References

SHOWING 1-10 OF 45 REFERENCES
Design of Integrated Vulnerabilities Database for Computer Networks Security Analysis
Research and Integration of Heterogeneous Vulnerability Database
Common Framework for Attack Modeling and Security Evaluation in SIEM Systems
  • I. Kotenko, A. Chechulin
  • Computer Science
  • 2012 IEEE International Conference on Green Computing and Communications
  • 2012
Using vulnerability information and attack graphs for intrusion detection
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
A Machine-Oriented Integrated Vulnerability Database for Automated Vulnerability Detection and Processing
Towards Unifying Vulnerability Information for Attack Graph Construction
...
1
2
3
4
5
...