TY - GEN
T1 - On stochastic risk ordering of network services for proactive security management
AU - Amezziane, Mohamed
AU - Al-Shaer, Ehab
AU - Ali, Muhammad Qasim
PY - 2012
Y1 - 2012
N2 - Contemporary network services don't have any statistical ranking mechanism for proactive security management. Since the emerging threats are actively exploiting the vulnerabilities in network services to compromise the system, not much attention has been paid to rank these services based on their vulnerability history. We argue in this paper that a reliable mechanism could be used to rank these services based on their vulnerability history. Such ranking will be significantly helpful for proactive network security management to partition services and deploy security countermeasures. We propose a framework using stochastic order alternatives to statistically rank network services based on time intervals between exploits as reported by National Vulnerability Database (NVD). We show that Statistical techniques can be used to rank these services by modeling the related metrics. We validated our technique using products of known ranking, and presented some case studies to confirm our result on real network services.
AB - Contemporary network services don't have any statistical ranking mechanism for proactive security management. Since the emerging threats are actively exploiting the vulnerabilities in network services to compromise the system, not much attention has been paid to rank these services based on their vulnerability history. We argue in this paper that a reliable mechanism could be used to rank these services based on their vulnerability history. Such ranking will be significantly helpful for proactive network security management to partition services and deploy security countermeasures. We propose a framework using stochastic order alternatives to statistically rank network services based on time intervals between exploits as reported by National Vulnerability Database (NVD). We show that Statistical techniques can be used to rank these services by modeling the related metrics. We validated our technique using products of known ranking, and presented some case studies to confirm our result on real network services.
UR - http://www.scopus.com/inward/record.url?scp=84864196549&partnerID=8YFLogxK
U2 - 10.1109/NOMS.2012.6212020
DO - 10.1109/NOMS.2012.6212020
M3 - Conference contribution
AN - SCOPUS:84864196549
SN - 9781467302685
T3 - Proceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012
SP - 994
EP - 1000
BT - Proceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012
T2 - 2012 IEEE Network Operations and Management Symposium, NOMS 2012
Y2 - 16 April 2012 through 20 April 2012
ER -