Intelligence in security countermeasures selection

被引:1
|
作者
Tamjidi, Sina [1 ]
Shameli-Sendi, Alireza [1 ]
机构
[1] Shahid Beheshti Univ SBU, Fac Comp Sci & Engn, Tehran, Iran
关键词
Intelligence; Risk; Vulnerability; Business Process; Countermeasure;
D O I
10.1007/s11416-022-00439-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identifying security risks in organizations and also determining their severity in order to select appropriate security countermeasures is of great importance in organizations. In the last two decades, a lot of work has been done to increase the accuracy of risk impact calculation as well as the right selection of countermeasures. Also, a variety of work has been proposed to select combined countermeasures instead of single ones. So there is a challenge to balance the cost of security with the improvement of the defense system. In this paper, a dataset that includes the organization business processes, security data, assets, vulnerabilities, and related security countermeasures is suggested for the first time. In the previous work, this chain of information from the content of the organization, which is definitely different from another organization, has not been considered for the analysis of the performance of countermeasures (success or failure). Based on the results of the countermeasures during the organization's lifetime, more efficient countermeasures can be suggested for new or existing risks. Therefore, by intelligently selecting the security countermeasures presented in this paper, organizations will be able to identify ineffective countermeasures and prevent them from being re-selected to counter attackers. In this way, we can make our organization more resilient to attackers over time.
引用
收藏
页码:137 / 148
页数:12
相关论文
共 50 条
  • [1] Intelligence in security countermeasures selection
    Sina Tamjidi
    Alireza Shameli-Sendi
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 137 - 148
  • [2] Artificial Intelligence Security: Threats and Countermeasures
    Hu, Yupeng
    Kuang, Wenxin
    Qin, Zheng
    Li, Kenli
    Zhang, Jiliang
    Gao, Yansong
    Li, Wenjia
    Li, Keqin
    ACM COMPUTING SURVEYS, 2023, 55 (01)
  • [3] Artificial Intelligence Security: Threats and Countermeasures
    Hu, Yupeng
    Kuang, Wenxin
    Qin, Zheng
    Li, Kenli
    Zhang, Jiliang
    Gao, Yansong
    Li, Wenjia
    Li, Keqin
    ACM Computing Surveys, 2021, 55 (01)
  • [4] PLANNING THE SELECTION AND ASSIGNMENT OF SECURITY FORENSICS COUNTERMEASURES
    Bajramovic, Edith
    Bochtler, Juergen
    Ben Zid, Ines
    Lainer, Andreas
    PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING, 2017, VOL 4, 2017,
  • [5] Planning the Selection and Assignment of Security Forensics Countermeasures
    Bajramovic, Edita
    Bochtler, Juergen
    Ben Zid, Ines
    Lainer, Andreas
    JOURNAL OF NUCLEAR ENGINEERING AND RADIATION SCIENCE, 2018, 4 (04):
  • [6] Privacy and security vulnerabilities in edge intelligence: An analysis and countermeasures
    Shafee, Ahmed
    Hasan, S. R.
    Awaad, Tasneem A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [7] Security intelligence for malware countermeasures to support NTT group's security business
    Hariu, Takeo
    Yokoyama, Keiichi
    Hatada, Mitsuhiro
    Yada, Takeshi
    Yagi, Takeshi
    Akiyama, Mitsuaki
    Ikuse, Tomonori
    Takata, Yuta
    Chiba, Daiki
    Tanaka, Yasuyuki
    NTT Technical Review, 2015, 13 (12):
  • [8] Security Countermeasures Selection Using the Meta Attack Language and Probabilistic Attack Graphs
    Widel, Wojciech
    Mukherjee, Preetam
    Ekstedt, Mathias
    IEEE ACCESS, 2022, 10 : 89645 - 89662
  • [9] Selection of countermeasures against network attacks based on dynamical calculation of security metrics
    Kotenko, Igor
    Doynikova, Elena
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (02): : 181 - 203
  • [10] Security Threats and Artificial Intelligence Based Countermeasures for Internet of Things Networks: A Comprehensive Survey
    Zaman, Shakila
    Alhazmi, Khaled
    Aseeri, Mohammed A.
    Ahmed, Muhammad Raisuddin
    Khan, Risala Tasin
    Kaiser, M. Shamim
    Mahmud, Mufti
    IEEE ACCESS, 2021, 9 : 94668 - 94690