Logo des Repositoriums
 

Foundations for intrusion prevention

dc.contributor.authorShai, Rubin
dc.contributor.authorAlderman, Ian D.
dc.contributor.authorParter, David W.
dc.contributor.authorVernon, Mary K.
dc.contributor.editorFlegel, Ulrich
dc.contributor.editorMeier, Michael
dc.date.accessioned2019-10-16T08:50:48Z
dc.date.available2019-10-16T08:50:48Z
dc.date.issued2004
dc.description.abstractWe propose an infrastructure that helps a system administrator to identify a newly published vulnerability on the site hosts and to evaluate the vulnerability's threat with respect to the administrator's security priorities. The infrastructure foundation is the vulnerability semantics, a small set of attributes for vulnerability definition. We demonstrate that with a few attributes it is possible to define the majority of the known vulnerabilities in a way that (i) facilitates their accurate identification, and (ii) enables the administrator to rank the vulnerabilities found according to the organization's security priorities. A large scale experiment demonstrates that our infrastructure can find significant vulnerabilities even in a site with a high security awareness.en
dc.identifier.isbn3-88579-375-X
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/29198
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofDetection of intrusions and malware & vulnerability assessment, GI SIG SIDAR workshop, DIMVA 2004
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-46
dc.titleFoundations for intrusion preventionen
dc.typeText/Conference Paper
gi.citation.endPage160
gi.citation.publisherPlaceBonn
gi.citation.startPage143
gi.conference.dateJuly 6-7, 2004
gi.conference.locationDortmund
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
GI.Proceedings.46-10.pdf
Größe:
135.99 KB
Format:
Adobe Portable Document Format