Abstract
One of the important phases of the computer system is to evaluate its security level. Increase in technology has brought more sophisticated intrusions with which the network security has become more challenging. Even though practically we cannot build a perfect system which is fully secure, we can ensure the security level of the system by quantitatively evaluating it, so that the system can be protected against many attacks. Security evaluation provided the probability of success in an intrusion system. The proposed technique involves converting a semi-Markov chain to proceed further as a discrete-time Markov chain to find the success rate of an attacker and the progression of an attacker over time is computed. The proposed DTMC model is analyzed to determine the security metrics, such as steady-state security and mean time to security failure quantitatively. The proposed DTMC technique proves to have improved results using stochastic modeling, which can be used for attack process modeling by dependability evaluation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
LeMay, E., Ford, M.D., Keefe, K., Sanders, W.H., Muehrcke, C.: Model-based security metrics using adversary view security evaluation (ADVISE). In: Proceedings of the 8th International Conference on Quantitative Evaluation of SysTems (QEST 2011), Aachen, Germany, 5–8 Sept 2011
Nicol, D.M., Sanders, W.H., Trivedi, K.S.: Model-based evaluation: from dependability to security. IEEE Trans. Dependable Secure Comput. 1(1), 48–65 (2004)
Madan, B., Goseva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. Perform. Eval. J. 56(1–4), 167–186 (2004)
Okamuva, H., Tokuzane, M., Dohi, T.: Security evaluation for software system with vulnerability life cycle and user profile. In: Proceedings of Workshop on Dependable Transportation Systems/Recent Advances in Software Dependability (WDTS-RASD) (2012)
Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Prentice Hall (2011)
Leversage, D.J., James, E.: Estimating a System’s Mean Time-to-Compromise, Security & Privacy, pp. 52–60. IEEE 16–19 March, IEEE CS Press (2008)
Arnes, A., Valeur, F., Vigna, G., Kemmerer, R.A.: Using hidden markov model to evaluate the risk of intrusion. In: Proceedings of 9th Symposium on Recent Advances in Intrusion Detection (2006)
Yang, N., Yu, H., Qian, Z., Sun, H.: Modelling and quantitatively predicting software security based on stochastic petrinets. J. Math. Comput. Model. 55, 102–112 (2012)
Almasizadeh, J., Azgomi, M.A.: A Stocastic model of attack process for the evaluation of security metrics. J. Comput. Netw. 57(10), 2159–2180 (2013)
Abraham, S., Nair, S.: Cyber security analytics: a stochastic model for security quantification using absorbing markov chains. J. Commun. 9(12) (2014)
Rapp, M., Hahn, M., Thom, M., Dickmann, J., Dietmayer, K.. Semi-markov process based localization using radar in dynamic environments. In: 2015 IEEE 18th International Conference on Intelligent Transportation Systems (ITSC), Sept 15, pp. 423–429. IEEE (2015)
Hussain, M.A., Jin, H., Hussien, Z.A., Abduljabbar, Z.A., Abbdal, S.H., Ibrahim, A.: DNS protection against spoofing and poisoning attacks. In: 2016 3rd International Conference on Information Science and Control Engineering (ICISCE), Jul 8, pp. 1308–1312. IEEE (2016)
Wireshark: https://wireshark.en.softonic.com
Roopam, B.: Review paper on prevention of DNS Spoofing. Int. J. Eng. Manage. Res. 4(3) (2014)
Sericola, B.: Discrete-Time Markov Chains. Markov Chains, pp. 1–87
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Narasimha Mallikarjunan, K., Mercy Shalinie, S., Sundarakantham, K., Aarthi, M. (2019). Evaluation of Security Metrics for System Security Analysis. In: Verma, N., Ghosh, A. (eds) Computational Intelligence: Theories, Applications and Future Directions - Volume I. Advances in Intelligent Systems and Computing, vol 798. Springer, Singapore. https://doi.org/10.1007/978-981-13-1132-1_15
Download citation
DOI: https://doi.org/10.1007/978-981-13-1132-1_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1131-4
Online ISBN: 978-981-13-1132-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)