This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
2009 WRI World Congress on Computer Science and Information Engineering
Automated Risk Assessment for Sources and Targets of Vulnerability Exploitation
Los Angeles, California USA
March 31-April 02
ISBN: 978-0-7695-3507-4
Abstract We extend existing work on security metrics by proposing a method to monitor the state of system entities in real-time. The primary focus is assessing the risk to and from access control request sources and targets. This process is critical in building effective dynamic access control methods that utilize assessment data for policy enforcement. Information on vulnerability exploitation attempts is used to derive risk assessments for entities in the system. To validate the approach, we demonstrate the use of our assessment method on analyzing the sources and targets in a widely used intrusion detection data set.
Index Terms:
Vulnerability Assessment, Risk Metrics
Citation:
Hassan Rasheed, Randy Y.C. Chow, "Automated Risk Assessment for Sources and Targets of Vulnerability Exploitation," csie, vol. 1, pp.150-154, 2009 WRI World Congress on Computer Science and Information Engineering, 2009
Usage of this product signifies your acceptance of the Terms of Use.