On stochastic risk ordering of network services for proactive security management

Mohamed Amezziane, Ehab Al-Shaer, Muhammad Qasim Ali

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Contemporary network services don't have any statistical ranking mechanism for proactive security management. Since the emerging threats are actively exploiting the vulnerabilities in network services to compromise the system, not much attention has been paid to rank these services based on their vulnerability history. We argue in this paper that a reliable mechanism could be used to rank these services based on their vulnerability history. Such ranking will be significantly helpful for proactive network security management to partition services and deploy security countermeasures. We propose a framework using stochastic order alternatives to statistically rank network services based on time intervals between exploits as reported by National Vulnerability Database (NVD). We show that Statistical techniques can be used to rank these services by modeling the related metrics. We validated our technique using products of known ranking, and presented some case studies to confirm our result on real network services.

Original languageEnglish
Title of host publicationProceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012
Pages994-1000
Number of pages7
DOIs
StatePublished - 2012
Event2012 IEEE Network Operations and Management Symposium, NOMS 2012 - Maui, HI, United States
Duration: Apr 16 2012Apr 20 2012

Publication series

NameProceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012

Conference

Conference2012 IEEE Network Operations and Management Symposium, NOMS 2012
Country/TerritoryUnited States
CityMaui, HI
Period04/16/1204/20/12

Fingerprint

Dive into the research topics of 'On stochastic risk ordering of network services for proactive security management'. Together they form a unique fingerprint.

Cite this