Evaluation of Security Metrics for System Security Analysis

Author(s):  
K. Narasimha Mallikarjunan ◽  
S. Mercy Shalinie ◽  
K. Sundarakantham ◽  
M. Aarthi
2021 ◽  
Vol 257 ◽  
pp. 01006
Author(s):  
Kaicheng Liu ◽  
Ying Guo ◽  
Dan Wang ◽  
Dezhi Li ◽  
Guixiong He

Regional integrated energy system (RIES) can realize multi-energy conversion and complementation so as to improve energy efficiency, which also brings more security risks. The regional integrated energy system security region (RIESSR) is a security analysis method to describe the safe area for the operating points of RIES based on the N-1 guideline. As a controllable device, energy storage (ES) which is installed in the energy hub (EH) plays an important role in improving system security. Therefore, this paper establishes the model of practical security region of RIES integrating energy storage, and studies the impact of ES on total supply capability (TSC) and practical security boundary. Finally, a specific case is set to simulate and verify the model. By comparing the scenario with ES and the scenario without ES, it can be seen that the solution result of TSC increases and the security region extends across quadrant when the RIES is integrated with ES system. The capacity and location of the ES also impact on TSC and RIESSR.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Zenan Wu ◽  
Liqin Tian ◽  
Yi Zhang ◽  
Yan Wang ◽  
Yuquan Du

At present, most network security analysis theory assumes that the players are completely rational. However, this is not consistent with the actual situation. In this paper, based on the effectiveness constraints on both sides with network attack and defense, with the help of stochastic Petri net and evolutionary game theory, the Petri net model of network attack and defense stochastic evolutionary game is reconstructed, the specific definition of the model is given, and the modeling method is given through the network connection relationship and attack and defense strategy set. Using this model, a quantitative analysis of network attack events is carried out to solve a series of indicators related to system security, namely, attack success rate, average attack time, and average system repair time. Finally, the proposed model and analysis method are applied to a classic network attack and defense process for experimental analysis, and the results verify the rationality and accuracy of the model and analysis method.


IJIREEICE ◽  
2015 ◽  
pp. 46-50 ◽  
Author(s):  
S. RAVINDRA ◽  
V.C.VEERA REDDY ◽  
S. SIVANAGARAJU

Author(s):  
Igor Kotenko ◽  
Elena Doynikova

This paper considers the issue of countermeasure selection for ongoing computer network attacks. We outline several challenges that should be overcome for the efficient response: the uncertainty of an attacker behavior, the complexity of interconnections between the resources of the modern distributed systems, the huge set of security data, time limitations, and balancing between countermeasure costs and attack losses. Although there are many works that are focused on the particular challenges, we suppose that there is still a need for an integrated solution that takes into account all of these issues. We suggest a model-driven approach to the security assessment and countermeasure selection in the computer networks that takes into account characteristics of different objects of assessment. The approach is based on integration with security information and event management systems to consider the dynamics of attack development, taking into account security event processing. Open standards and databases are used to automate security data processing. The suggested technique for countermeasure selection is based on the countermeasure model that was defined on the basis of open standards, the family of interrelated security metrics, and the security analysis technique based on attack graphs and service dependencies. We describe the prototype of the developed system and validate it on several case studies.


1993 ◽  
Vol 26 (3) ◽  
pp. 231-236 ◽  
Author(s):  
Yung-Chung Chang ◽  
Wei-Tzen Yang ◽  
Chun-Chang Liu

Sign in / Sign up

Export Citation Format

Share Document