81,743 Hits in 6.5 sec

Reaction Policy Model Based on Dynamic Organizations and Threat Context [chapter]

Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens
2009 Lecture Notes in Computer Science  
We present in this article an extension of the OrBAC model by defining dynamic organizations and threat contexts to enable the expression and enforcement of reaction requirements.  ...  However, such models as RBAC or OrBAC are not used to express reaction requirements which specify the reaction policy to enforce when intrusions are detected.  ...  In this paper, we shall define a model based on the concept of dynamic organization created to manage intrusions which significantly enhances the approach suggested in [DTCCB07] .  ... 
doi:10.1007/978-3-642-03007-9_4 fatcat:6k566liylngcjj6gkghu7wcyxu

An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies [chapter]

Nabil Hachem, Joaquin Garcia-Alfaro, Hervé Debar
2013 Lecture Notes in Computer Science  
This paper introduces a novel framework to define, generate and implement mitigation policies on MPLS routers.  ...  As network attacks become more complex, defence strategies must provide means to handle more flexible and dynamic requirements.  ...  Threat Contexts We model the management of threat contexts based on the construction of the original HADEGA proposal presented in [16] .  ... 
doi:10.1007/978-3-642-41488-6_20 fatcat:dlv3ealiovf4jdq7bjk4xp76ra

Risk-Aware Framework for Activating and Deactivating Policy-Based Response

Wael Kanoun, Nora Cuppens-Boulahia, Frederic Cuppens, Samuel Dubus
2010 2010 Fourth International Conference on Network and System Security  
Hence, the success likelihood of the threat, and the cumulative impact of both of the threat and the response, are all considered.  ...  An interesting approach proposes to use dynamic access control policies to specify response policies for such systems.  ...  The OrBAC Model OrBAC is a security policy model centered on the concept of organization. Using OrBAC, security policies are specified at an abstract level.  ... 
doi:10.1109/nss.2010.80 dblp:conf/nss/KanounCCD10 fatcat:nphpgzklkzcb3huotclq3y5ltu

Enabling automated threat response through the use of a dynamic security policy

Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia
2007 Journal in Computer Virology  
We propose an architecture allowing to dynamically and automatically deploy a generic security policy into concrete policy instances taking into account the threat level characterized thanks to intrusion  ...  The response process is far from trivial, since it both relies on the relevance of the threat analysis and on the adequacy of the selected countermeasures.  ...  Context management The central idea of our proposal is based on using contexts to model how to dynamically update the security policy when a threat is detected.  ... 
doi:10.1007/s11416-007-0039-z fatcat:j5o6553wivet3nzngk2qzs2tay

Using Contextual Security Policies for Threat Response [chapter]

Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens
2006 Lecture Notes in Computer Science  
In this paper, we will examine a new mechanism for adapting the security policy of an information system according to the threat it receives, and hence its behaviour and the services it offers.  ...  This mechanism takes into account not only threats, but also legal constraints and other objectives of the organization operating this information system, taking into account multiple security objectives  ...  Application of the Or-BAC Formalism to Threat Response The central idea of our proposal is based on using contexts to model how to dynamically update the security policy when an intrusion is detected.  ... 
doi:10.1007/11790754_7 fatcat:zrngb45jhraupbf5k75554kchy

Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques

Jeffrey Hunker, Christian W. Probst
2011 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
In parallel, the Defense Department produced its own report [6], outlining both a set of policy changes and research directions aimed at addressing the insider threat.  ...  This "insider threat" has received considerable attention, and is cited as one of the most serious security problems [ 2] 1 .  ...  A major challenge for policy development concerns issues of "context" and "dynamicity".  ... 
doi:10.22667/jowua.2011.03.31.004 dblp:journals/jowua/HunkerP11 fatcat:5iwopvcufndzrltdbub5a32lye

Metric for Security Activities Assisted by Argumentative Logic [chapter]

Tarek Bouyahia, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel
2015 Lecture Notes in Computer Science  
In this paper, the argumentative logic is used to reason about the rationale behind dynamic enforcement of security policies.  ...  This paper introduces an approach for efficient enforcement of security requirements based on argumentative logic, especially reasoning about activation or deactivation of different security mechanisms  ...  Security Policies We start by defining the reaction policies, which presents the knowledge base of security policies defined by the target organization.  ... 
doi:10.1007/978-3-319-17016-9_12 fatcat:ppa3gzmnk5a2xkdbclsggdu23m

Linkage Between Pre- and Post- Conflict: Exploiting Information Integration & System Dynamics

Nazli Choucri, Stuart E. Madnick, Allen Moulton, Michael Siegel, Hongwei (Harry) Zhu
2005 Social Science Research Network  
This paper focuses on new opportunities and capabilities provided by anticipatory technologies that help understand, measure and model the complex dynamics shaping and precipitating conflict in specific  ...  policies, plans, and practices to deter or defeat it" (2004: xvi).  ...  His research focuses on applying automated reasoning technology to the problem of resolving semantic differences in the interchange of information among autonomous, heterogeneous data sources and receivers  ... 
doi:10.2139/ssrn.643681 fatcat:zyjwhxr4fnaylpeyhws3nxlm3a

Awareness and reaction strategies for critical infrastructure protection

Lorena Cazorla, Cristina Alcaraz, Javier Lopez
2015 Computers & electrical engineering  
contexts.  ...  Through our study we look at different reaction systems and learn from them how to better create IDPRS solutions for CIP.  ...  The third author has been partially funded by the research projects PISCIS (P10-TIC-06334) and PERSIST (TIN2013-41739-R).  ... 
doi:10.1016/j.compeleceng.2015.08.010 fatcat:unuqtxsfrrcybbrcj2bxodbaeu

Incident-centered information security: Managing a strategic balance between prevention and response

Richard Baskerville, Paolo Spagnoletti, Jongwoo Kim
2014 Information & Management  
Prevention models operate by looking across past experiences with known threats and estimating future occurrences based on continuing similar events.  ...  It becomes necessary to rebalance security strategies across the two paradigms when the organizational threat context grows dynamic.  ... 
doi:10.1016/ fatcat:3xfg6izhtrh37bvgkryay3oixy

Usage Control Policy Enforcement In Sdn-Based Clouds: A Dynamic Availability Service Use Case

Khalifa Toumi, Muhammad Idrees Sabir, Fabien Charmet, Reda Yaich, Gregory Blanc
2016 Zenodo  
In this paper, we present a novel solution to answer those needs with usage control policies. We design a policy based management framework offering SDN network security policies.  ...  to fit corporate needs, like firewalls, load balancers and security services.  ...  Modeling Security Policies Based on the different requirements and challenges highlighted in the Section I, we need to select a security policy model which is capable of modeling various types of security  ... 
doi:10.5281/zenodo.439061 fatcat:z5apm7fygffivahoaryx7bkclq

Dynamic deployment of context-aware access control policies for constrained security devices

Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro, Laurent Toutain
2011 Journal of Systems and Software  
To overcome this issue, our solution is based on a central entity approach which takes in charge unmanaged contextual requirements and dynamically redeploys the policy when context changes are detected  ...  Such requirements are identied based on organizational purposes and expectations in terms of resource access and availability and also on system vulnerabilities and threats.  ...  Proposals like [18] and [19] deal with the deployment of reactive policies to neutralize security threats. In [19] , the threats are modeled as contexts.  ... 
doi:10.1016/j.jss.2011.02.005 fatcat:poldqf2o2fdizjdhiewtzsgjja

Homeland Security

J. Yen, R. Popp, G. Cybenko, K.A. Taipale, L. Sweeney, P. Rosenzweig
2005 IEEE Intelligent Systems  
The country responded clearly with a policy toward the Soviet threat that centered on deterrence, containment, and mutually assured destruction.  ...  The strategic threat is far more complicated and dynamic. New and deadly challenges-from irregular adversaries to catastrophic weapons to rogue states-have emerged.  ...  edge technological marvels with methods, models, and technologies from the quantitative and computational social sciences.  ... 
doi:10.1109/mis.2005.89 fatcat:rkuv64pokneordsge6rpmaont4


Louise K. Comfort
2005 Annual review of political science (Palo Alto, Calif. Print)  
This analysis reframes the issue of managing risk by focusing on the distinction between policies and practices developed in reference to natural and technological hazards and those developed to enhance  ...  of establishing greater control over possible threats through administrative structures.  ...  performance for dynamic contexts.  ... 
doi:10.1146/annurev.polisci.8.081404.075608 fatcat:kyoymy5brbc25j6qtqy7g7oruq

Application of Ontologies and Formal Behaviour Decisions for Automated Intrusion Response Systems

Verónica Mateos Lanchas, Víctor A. Villagrá, Julio Berrocal
2014 Journal of research and practice in information technology  
The existing AIRS use diff erent mechanisms to infer the optimum response when a security incident is detected, but there is no standardized framework that models all the elements used in the reaction  ...  This paper proposes an ontology-based approach for automatically responding against intrusions.  ...  Vulnerability is associated with one asset or more. -Threat: Models the intrusion type. A threat threatens a SecurityGoal.  ... 
dblp:journals/acj/LanchasVB14 fatcat:yflvtion6jfrrdvf4jclhivxia
« Previous Showing results 1 — 15 out of 81,743 results