k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities

@article{Wang2014kZeroDS,
  title={k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities},
  author={Lingyu Wang and Sushil Jajodia and Anoop Singhal and Pengsu Cheng and Steven Noel},
  journal={IEEE Transactions on Dependable and Secure Computing},
  year={2014},
  volume={11},
  pages={30-44}
}
By enabling a direct comparison of different security solutions with respect to their relative effectiveness, a network security metric may provide quantifiable evidences to assist security practitioners in securing computer networks. However, research on security metrics has been hindered by difficulties in handling zero-day attacks exploiting unknown vulnerabilities. In fact, the security risk of unknown vulnerabilities has been considered as something unmeasurable due to the less predictable… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 60 CITATIONS, ESTIMATED 24% COVERAGE

Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks

  • 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm)
  • 2017
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language

  • IEEE Trans. Dependable Sec. Comput.
  • 2015
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Discovering and Mitigating New Attack Paths Using Graphical Security Models

  • 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)
  • 2017
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Scalable and adaptable security modelling and analysis.

VIEW 9 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2013
2019

CITATION STATISTICS

  • 7 Highly Influenced Citations

  • Averaged 13 Citations per year over the last 3 years

References

Publications referenced by this paper.
SHOWING 1-10 OF 39 REFERENCES

W32.stuxnet dossier

N. Falliere, L. O. Murchu, E. Chien
  • Symantec Security Response,
  • 2011
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Common Vulnerability Scoring System

  • IEEE Security & Privacy
  • 2006
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

A note on two problems in connection with graphs

E. W. Dijkstra
  • Numerische Mathematik, 1:269271,
  • 1959
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

A large scale exploratory analysis of software vulnerability life cycles

  • 2012 34th International Conference on Software Engineering (ICSE)
  • 2012
VIEW 1 EXCERPT

Dynamic Security Risk Management Using Bayesian Attack Graphs

  • IEEE Transactions on Dependable and Secure Computing
  • 2012
VIEW 1 EXCERPT

Effort Estimates for Vulnerability Discovery Projects

  • 2012 45th Hawaii International Conference on System Sciences
  • 2012
VIEW 1 EXCERPT

Similar Papers

Loading similar papers…