DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/xmlui/handle/123456789/8397
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKumar, Rajesh-
dc.date.accessioned2023-01-09T09:01:23Z-
dc.date.available2023-01-09T09:01:23Z-
dc.date.issued2015-09-
dc.identifier.urihttps://arxiv.org/abs/1510.00050-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8397-
dc.description.abstractThe success of a security attack crucially depends on time: the more time available to the attacker, the higher the probability of a successful attack. Formalisms such as Reliability block diagrams, Reliability graphs and Attack Countermeasure trees provide quantitative information about attack scenarios, but they are provably insufficient to model dependent actions which involve costs, skills, and time. In this presentation, we extend the Attack Countermeasure trees with a notion of time; inspired by the fact that there is a strong correlation between the amount of resources in which the attacker invests (in this case time) and probability that an attacker succeeds. This allows for an effective selection of countermeasures and rank them according to their resource consumption in terms of costs/skills of installing them and effectiveness in preventing an attacken_US
dc.language.isoenen_US
dc.publisherARXIVen_US
dc.subjectComputer Scienceen_US
dc.subjectCryptography and Securityen_US
dc.titleTime Dependent Analysis with Dynamic Counter Measure Treesen_US
dc.typeArticleen_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.