Contribution of Quantitative Security Evaluation to Intrusion Detection

12/2/98


Click here to start


Table of Contents

Contribution of Quantitative Security Evaluation to Intrusion Detection

Security Evaluation

Quantitative Evaluation Framework

Vulnerability Modeling: privilege graph

Assumptions on the Intrusion Process

Example of Intrusion Process

Quantitative Measures

Experiment Objectives

Experiment Context

Experiment Results - Example

Comparison with other Tools (I)

Comparison with other Tools (II)

Relationship with Intrusion Detection

Author: YD

Email: deswarte@laas.fr

Download presentation source