Security Rating Metrics for Distributed Wireless Systems

06/26/2019
by   Volodymyr Buriachok, et al.
0

The paper examines quantitative assessment of wireless distribution system security, as well as an assessment of risks from attacks and security violations. Furthermore, it describes typical security breach and formal attack models and five methods for assessing security. The proposed normalized method for assessing the degree of security assurance operates with at least three characteristics, which allows comparatively analyze heterogeneous information systems. The improved calculating formulas have been proposed for two security assessment methods, and the elements of functional-cost analysis have been applied to calculate the degree of security. To check the results of the analysis, the coefficient of concordance was calculated, which gives opportunity to determine the quality of expert assessment. The simultaneous use of several models to describe attacks and the effectiveness of countering them allows us to create a comprehensive approach to countering modern security threats to information networks at the commercial enterprises and critical infrastructure facilities.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/28/2021

State Compression and Quantitative Assessment Model for Assessing Security Risks in the Oil and Gas Transmission Systems

The SCADA system is the foundation of the large-scale industrial control...
research
08/14/2021

Security Assessment Rating Framework for Enterprises using MITRE ATT CK Matrix

Threats targeting cyberspace are becoming more prominent and intelligent...
research
02/05/2021

Security Assessment and Impact Analysis of Cyberattacks in Integrated T D Power Systems

In this paper, we examine the impact of cyberattacks in an integrated tr...
research
04/28/2021

Timing Covert Channel Analysis of the VxWorks MILS Embedded Hypervisor under the Common Criteria Security Certification

Virtualization technology is nowadays adopted in security-critical embed...
research
06/22/2020

An In-Depth Security Assessment of Maritime Container Terminal Software Systems

Attacks on software systems occur world-wide on a daily basis targeting ...
research
12/18/2020

Effectiveness of SCADA System Security Used Within Critical Infrastructure

Since the 1960s Supervisory Control and Data Acquisition (SCADA) systems...
research
12/10/2021

How to Quantify the Security Level of Embedded Systems? A Taxonomy of Security Metrics

Embedded Systems (ES) development has been historically focused on funct...

Please sign up or login with your details

Forgot password? Click here to reset