LEADER 05050nam 22005415 450 001 9910254849503321 005 20200701045150.0 010 $a3-319-66505-7 024 7 $a10.1007/978-3-319-66505-4 035 $a(CKB)4100000001041462 035 $a(DE-He213)978-3-319-66505-4 035 $a(MiAaPQ)EBC5149443 035 $a(PPN)221254811 035 $a(EXLCZ)994100000001041462 100 $a20171115d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNetwork Security Metrics /$fby Lingyu Wang, Sushil Jajodia, Anoop Singhal 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XIV, 207 p. 110 illus., 63 illus. in color.) 311 $a3-319-66504-9 320 $aIncludes bibliographical references at the end of each chapters. 327 $a1 Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs and Bayesian Networks -- 2 Refining CVSS-based network security metrics by examining the base scores -- 3 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs -- 4 k-Zero day safety: Evaluating the resilience of networks against unknown attacks -- 5 Using Bayesian Networks to Fuse Intrusion Evidences and Detect Zero-day Attack Paths -- 6 Evaluating the network diversity of networks against zero-day attacks -- 7 Metrics suite for network attack graph analytics -- 8 A Novel Metric for Measuring Operational Effectiveness of a Cybersecurity Operations Center. 330 $aThis book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since ?you cannot improve what you cannot measure?, a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC). Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text. 606 $aComputer security 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 676 $a005.8 700 $aWang$b Lingyu$4aut$4http://id.loc.gov/vocabulary/relators/aut$0918901 702 $aJajodia$b Sushil$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aSinghal$b Anoop$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910254849503321 996 $aNetwork Security Metrics$92538894 997 $aUNINA