Contribution of Quantitative Security Evaluation to Intrusion Detection

Security Evaluation

Quantitative Evaluation Framework

Vulnerability Modeling: privilege graph

Assumptions on the Intrusion Process

Example of Intrusion Process

Quantitative Measures

Experiment Objectives

Experiment Context

Experiment Results - Example

Comparison with other Tools (I)

Comparison with other Tools (II)

Relationship with Intrusion Detection