Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2015, Article ID 703713, 5 pages
http://dx.doi.org/10.1155/2015/703713
Research Article

Using a Prediction Model to Manage Cyber Security Threats

Department of Management Studies, Anna University Regional Centre Coimbatore, Jothipuram Post, Coimbatore, Tamilnadu 641 047, India

Received 12 September 2014; Revised 14 December 2014; Accepted 25 December 2014

Academic Editor: Aneel Rahim

Copyright © 2015 Venkatesh Jaganathan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing, “Automated generation and analysis of attack graphs,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 273–284, May 2002. View at Scopus
  2. L. Wang, A. Singhal, and S. Jajodia, “Toward measuring network security using attack graphs,” in Proceedings of the ACM Workshop on Quality of Protection, pp. 49–54, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  3. M. E. Kuhl, J. Kistner, K. Costantini, and M. Sudit, “Cyber attack modeling and simulation for network security analysis,” in Proceedings of the Winter Simulation Conference (WSC '07), pp. 1180–1188, Washington, DC, USA, December 2007. View at Publisher · View at Google Scholar · View at Scopus
  4. E. Tittel, Preventing and Avoiding Network Security Threats and Vulnerabilities, 2013, http://www.tomsitpro.com/articles/threat_management-it_security-firewall-it_certification-network_security,2-477.html.
  5. J. Wu, L. Yin, and Y. Guo, “Cyber attacks prediction model based on Bayesian network,” in Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems (ICPADS '12), pp. 730–731, Singapore, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. N. S. Anusha, T. S. Soujanya, and D. S. Vasavi, “Study on techniques for providing enhanced security during online exams,” International Journal of Engineering Inventions, vol. 1, no. 1, pp. 32–37, 2012. View at Google Scholar
  7. E. T. Axelrad, P. J. Sticha, O. Brdiczka, and J. Shen, “A Bayesian network model for predicting insider threats,” in Proceedings of the 2nd IEEE Security and Privacy Workshops (SPW '13), pp. 82–89, May 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. M. A. Khan and M. Hussain, “Cyber security quantification model,” Bahria University Journal of Information and Communication Technology, vol. 3, no. 1, pp. 23–27, 2010. View at Google Scholar
  9. A. P. Moore, D. A. Mundie, and M. L. Collins, “A system dynamics model for investigating early detection of insider threat risk,” Tech. Rep. DM-0000143, Program Software Engineering Institute, Carnegie Mellon University, 2013. View at Google Scholar
  10. M. Mateski, C. M. Trevino, C. K. Veitch et al., “Cyber threat metrics,” Sandia Report SAND2012-2427, 2012. View at Google Scholar
  11. O. T. Oluwatosin and D. D. Samson, “Computer-based test security and result integrity,” International Journal of Computer and Information Technology, vol. 2, no. 2, pp. 324–329, 2013. View at Google Scholar
  12. L. K. Shar, H. Beng Kuan Tan, and L. C. Briand, “Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis,” in Proceedings of the 35th International Conference on Software Engineering (ICSE '13), pp. 642–651, IEEE Press, May 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. P. Mell, K. Scarfone, and S. Romanosky, A Complete Guide to the Common Vulnerability Scoring System Version 2.0, National Institute of Standards and Technology, Carnegie Mellon University, 2007.
  14. P. Mell, K. Scarfone, and S. Romanosky, A Complete Guide to the Common Vulnerability Scoring System, Version 2.0, 2007.
  15. Redhat, Bash Code Injection Vulnerability via Specially Crafted Environment Variables (CVE-2014-6271, CVE-2014-7169), Redhat, 2014, https://access.redhat.com/articles/1200223.
  16. Sensitive Data Protection Vulnerability, OWASP, https://www.owasp.org/index.php/Category:Sensitive_Data_Protection_Vulnerability.
  17. https://www.owasp.org/index.php/Category:Vulnerability.