• Login
    View Item 
    •   Home
    • IRAC Institute for Research in Applicable Computing - to April 2016
    • Centre for Research in Distributed Technologies (CREDIT)
    • View Item
    •   Home
    • IRAC Institute for Research in Applicable Computing - to April 2016
    • Centre for Research in Distributed Technologies (CREDIT)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of UOBREPCommunitiesTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalDepartmentThis CollectionTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalDepartment

    My Account

    LoginRegister

    About

    AboutLearning ResourcesResearch Graduate SchoolResearch InstitutesUniversity Website

    Statistics

    Display statistics

    A visualisation technique for the identification of security threats in networked systems

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Authors
    Maple, Carsten
    Viduto, Valentina
    Issue Date
    2010
    
    Metadata
    Show full item record
    Abstract
    This paper is primarily focused on the increased IT complexity problem and the identification of security threats in networked systems. Modern networking systems, applications and services are found to be more complex in terms of integration and distribution, therefore, harder to be managed and protected. CIOs have to put their effort on threat's identification, risk management and security evaluation processes. Objective decision making requires measuring, identifying and evaluating all enterprise events, either positive (opportunities) or negative (risks) and keeping them in perspective with the business objectives. Our approach is based on a visualisation technique that helps in decision making process, focusing on the threat identification using attack scenarios. For constructing attack scenarios we use the notion of attack graphs, as well as layered security approach. The proposed onion skin model combines attack graphs and security layers to illustrate possible threats and shortest paths to the attacker's goal. By providing few examples we justify the advantage of the threat identification technique in decision making process.
    Citation
    Viduto, V., Maple, C. (2010) “A visualisation technique for the identification of security threats in networked systems”, In 14th International Conference on Information Visualisation, IV 2010, 26-29 July, London, UK, IEEE Computer Society, 2010,pp. 551-556.
    Publisher
    IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
    URI
    http://hdl.handle.net/10547/270638
    DOI
    10.1109/IV.2010.81
    Additional Links
    http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5571147
    Type
    Conference papers, meetings and proceedings
    Language
    en
    ISBN
    9780769541655
    ae974a485f413a2113503eed53cd6c53
    10.1109/IV.2010.81
    Scopus Count
    Collections
    Centre for Research in Distributed Technologies (CREDIT)

    entitlement

     
    DSpace software (copyright © 2002 - 2021)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.