
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Xiaohu Li, Timothy Paul Parker, Shouhuai Xu, "A Stochastic Model for Quantitative Security Analyses of Networked Systems," IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 1, pp. 2843, JanuaryFebruary, 2011.  
BibTex  x  
@article{ 10.1109/TDSC.2008.75, author = {Xiaohu Li and Timothy Paul Parker and Shouhuai Xu}, title = {A Stochastic Model for Quantitative Security Analyses of Networked Systems}, journal ={IEEE Transactions on Dependable and Secure Computing}, volume = {8}, number = {1}, issn = {15455971}, year = {2011}, pages = {2843}, doi = {http://doi.ieeecomputersociety.org/10.1109/TDSC.2008.75}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Dependable and Secure Computing TI  A Stochastic Model for Quantitative Security Analyses of Networked Systems IS  1 SN  15455971 SP28 EP43 EPD  2843 A1  Xiaohu Li, A1  Timothy Paul Parker, A1  Shouhuai Xu, PY  2011 KW  Security modeling KW  quantitative security analysis KW  vulnerability graph KW  networked systems KW  security metric. VL  8 JA  IEEE Transactions on Dependable and Secure Computing ER   
[1] R. Albert and A. Barabasi, "Statistical Mechanics of Complex Networks," Rev. of Modern Physics, vol. 74, pp. 4797, 2002.
[2] R. Albert, H. Jeong, and A. Barabasi, "Error and Attack Tolerance of Complex Networks," Nature, vol. 406, pp. 378482, 2000.
[3] P. Ammann, D. Wijesekera, and S. Kaushik, "Scalable, GraphBased Network Vulnerability Analysis," Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), pp. 217224, 2002.
[4] R. Anderson and R. May, Infectious Diseases of Humans. Oxford Univ. Press, 1991.
[5] Four Grand Challenges in Trustworthy Computing. The Computing Research Assoc., http://www.cra.org/Activitiesgrand. challenges /, 2003.
[6] N. Bailey, The Mathematical Theory of Infectious Diseases and Its Applications, second ed., 1975.
[7] A. Barabasi and R. Albert, "Emergence of Scaling in Random Networks," Science, vol. 286, pp. 509512, 1999.
[8] R. Chinchani, A. Iyer, H. Ngo, and S. Upadhyaya, "Towards a Theory of Insider Threat Assessment," Proc. Int'l Conf. Dependable Systems and Networks (DSN '05), pp. 108117, 2005.
[9] M. Dacier and Y. Deswarte, "Privilege Graph: An Extension to the Typed Access Matrix Model," Proc. Third European Symp. Research in Computer Security (ESORICS '94), vol. 875, pp. 319334, 1994.
[10] P. Erdos and A. Renyi, "On the Evolution of Random Graphs," Publications of the Math. Inst. Hungarian Academy of Sciences, vol. 5, pp. 1761, 1960.
[11] A. Ganesh, L. Massoulie, and D. Towsley, "The Effect of Network Topology on the Spread of Epidemics," Proc. IEEE INFOCOM, 2005.
[12] S. Jha and J. Wing, "Survivability Analysis of Networked Systems," Proc. 23rd Int'l Conf. Software Eng. (ICSE '01), pp. 307317, 2001.
[13] J. Kephart and S. White, "DirectedGraph Epidemiological Models of Computer Viruses," Proc. IEEE Symp. Security and Privacy (S&P '91), pp. 343361, 1991.
[14] W. Kermack and A. McKendrick, "A Contribution to the Mathematical Theory of Epidemics," Proc. Royal Soc. London A, vol. 115, pp. 700721, 1927.
[15] B. Madan, K. GoševaPopstojanova, K. Vaidyanathan, and K. Trivedi, "A Method for Modeling and Quantifying the Security Attributes of Intrusion Tolerant Systems," Performance Evaluation, vol. 56, nos. 14, pp. 167186, 2004.
[16] M. Matsumoto and T. Nishimura, "Mersenne Twister: A 623Dimensionally Equidistributed Uniform PseudoRandom Number Generator," ACM Trans. Modeling and Computer Simulation, vol. 8, no. 1, pp. 330, 1998.
[17] A. McKendrick, "Applications of Mathematics to Medical Problems," Proc. Edinburgh Math. Soc., vol. 14, pp. 98130, 1926.
[18] A. Medina, A. Lakhina, I. Matta, and J. Byers, "Brite: An Approach to Universal Topology Generation," Proc. Int'l Symp. Modeling, Analysis and Simulation of Computer and Telecomm. Systems (MASCOTS '01), pp. 346356, 2001.
[19] Y. Moreno, R. PastorSatorras, and A. Vespignani, "Epidemic Outbreaks in Complex Heterogeneous Networks," European Physical J. B, vol. 26, pp. 521529, 2002.
[20] D. Nicol, W. Sanders, and K. Trivedi, "ModelBased Evaluation: From Dependability to Security," IEEE Trans. Dependable and Secure Computing, vol. 1, no. 1, pp. 4865, 2004.
[21] R. Ortalo, Y. Deswarte, and M. Kaaniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security," IEEE Trans. Software Eng., vol. 25, no. 5, pp. 633650, 1999.
[22] C. Palmer and J. Steffan, "Generating Network Topologies That Obey Power Laws," Proc. IEEE Global Telecomm. Conf. (GLOBECOM), 2000.
[23] R. PastorSatorras and A. Vespignani, "Epidemics and Immunization in ScaleFree Networks," Handbook of Graphs and Networks: From the Genome to the Internet, 2008.
[24] R. PastorSatorras and A. Vespignani, "Epidemic Dynamics and Endemic States in Complex Networks," Physical Rev. E, vol. 63, p. 066117, 2001.
[25] R. PastorSatorras and A. Vespignani, "Epidemic Dynamics in Finite Size ScaleFree Networks," Physical Rev. E, vol. 65, p. 035108, 2002.
[26] M. Pease, R. Shostak, and L. Lamport, "Reaching Agreement in the Presence of Faults," J. ACM, vol. 27, no. 2, pp. 228234, 1980.
[27] C. Phillips and L. Swiler, "A GraphBased System for NetworkVulnerability Analysis," Proc. Workshop New Security Paradigms (NSPW '98), pp. 7179, 1998.
[28] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker, "A Scalable ContentAddressable Network," Proc. ACM SIGCOMM '01, pp. 161172, 2001.
[29] S. Ross, Stochastic Processes, Wiley Series in Probability and Math. Statistics. John Wiley & Sons, 1996.
[30] M. Shaked and J. Shanthikumar, Stochastic Orders and Their Applications. Academic Press, 1994.
[31] I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan, "Chord: A Scalable PeertoPeer Lookup Service for Internet Applications," Proc. ACM SIGCOMM '01, pp. 149160, 2001.
[32] K. Trivedi, Probability and Statistics with Reliability, Queuing and Computer Science Applications. John Wiley & Sons, 2001.
[33] J. Wang, L. Lu, and A. Chien, "Tolerating DenialofService Attacks Using Overlay Networks—Impact of Topology," Proc. First ACM Workshop Survivable and SelfRegenerative Systems (SSRS), 2003.
[34] Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos, "Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint," Proc. 22nd IEEE Symp. Reliable Distributed Systems (SRDS '03), pp. 2534, 2003.