Experimenting with quantitative evaluation tools for monitoring operational security

Citation
R. Ortalo et al., Experimenting with quantitative evaluation tools for monitoring operational security, IEEE SOFT E, 25(5), 1999, pp. 633-650
Citations number
15
Categorie Soggetti
Computer Science & Engineering
Journal title
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
ISSN journal
00985589 → ACNP
Volume
25
Issue
5
Year of publication
1999
Pages
633 - 650
Database
ISI
SICI code
0098-5589(199909/10)25:5<633:EWQETF>2.0.ZU;2-4
Abstract
This paper presents the results of an experiment in security evaluation. Th e system is modeled as a privilege graph that exhibits its security vulnera bilities. Quantitative measures that estimate the effort an attacker might expend to exploit these Vulnerabilities to defeat the system security objec tives are proposed. A set of tools has been developed to compute such measu res and has been used in an experiment to monitor a large real system for n early two years. The experimental results are presented and the validity of the measures is discussed. Finally, the practical usefulness of such tools for operational security monitoring is shown and a comparison with other e xisting approaches is given.