Network Security Metrics

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Network Security Metrics by Lingyu Wang, Anoop Singhal, Sushil Jajodia, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Lingyu Wang, Anoop Singhal, Sushil Jajodia ISBN: 9783319665054
Publisher: Springer International Publishing Publication: November 15, 2017
Imprint: Springer Language: English
Author: Lingyu Wang, Anoop Singhal, Sushil Jajodia
ISBN: 9783319665054
Publisher: Springer International Publishing
Publication: November 15, 2017
Imprint: Springer
Language: English

This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since “you cannot improve what you cannot measure”, a network security metric is essential to evaluating the relative effectiveness of potential network security solutions.

The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective.

Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC).

Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since “you cannot improve what you cannot measure”, a network security metric is essential to evaluating the relative effectiveness of potential network security solutions.

The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective.

Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC).

Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.

More books from Springer International Publishing

Cover of the book Neuroimaging of Traumatic Brain Injury by Lingyu Wang, Anoop Singhal, Sushil Jajodia
Cover of the book Energy, Complexity and Wealth Maximization by Lingyu Wang, Anoop Singhal, Sushil Jajodia
Cover of the book Historic Indoor Microclimate of the Heritage Buildings by Lingyu Wang, Anoop Singhal, Sushil Jajodia
Cover of the book Audiovisual Quality Assessment and Prediction for Videotelephony by Lingyu Wang, Anoop Singhal, Sushil Jajodia
Cover of the book Cuckoo Search and Firefly Algorithm by Lingyu Wang, Anoop Singhal, Sushil Jajodia
Cover of the book Pathophysiology and Pharmacotherapy of Cardiovascular Disease by Lingyu Wang, Anoop Singhal, Sushil Jajodia
Cover of the book Peak-to-Peak Output Current Ripple Analysis in Multiphase and Multilevel Inverters by Lingyu Wang, Anoop Singhal, Sushil Jajodia
Cover of the book Risks, Relationships and Success Factors in IT Outsourcing by Lingyu Wang, Anoop Singhal, Sushil Jajodia
Cover of the book Modern Organocatalyzed Methods in Carbohydrate Chemistry by Lingyu Wang, Anoop Singhal, Sushil Jajodia
Cover of the book Representing Realists in Victorian Literature and Criticism by Lingyu Wang, Anoop Singhal, Sushil Jajodia
Cover of the book Inventing the Gothic Corpse by Lingyu Wang, Anoop Singhal, Sushil Jajodia
Cover of the book Entrepreneurship in Former Yugoslavia by Lingyu Wang, Anoop Singhal, Sushil Jajodia
Cover of the book A Simple Introduction to the Mixed Finite Element Method by Lingyu Wang, Anoop Singhal, Sushil Jajodia
Cover of the book Resistance of Targeted Therapies Excluding Antibodies for Lymphomas by Lingyu Wang, Anoop Singhal, Sushil Jajodia
Cover of the book Solid Surfaces, Interfaces and Thin Films by Lingyu Wang, Anoop Singhal, Sushil Jajodia
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy