dc.contributor.author | Wangen, Gaute | |
dc.contributor.author | Shalaginov, Andrii | |
dc.contributor.author | Hallstensen, Christoffer V | |
dc.date.accessioned | 2018-02-12T11:49:32Z | |
dc.date.available | 2018-02-12T11:49:32Z | |
dc.date.created | 2016-12-05T13:48:35Z | |
dc.date.issued | 2016 | |
dc.identifier.citation | Lecture Notes in Computer Science. 2016, 9866 183-202. | nb_NO |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | http://hdl.handle.net/11250/2484068 | |
dc.description.abstract | This paper proposes a risk assessment process based on distinct classes and estimators, which we apply to a case study of a common communications security risk; a distributed denial of service attack (DDoS) attack. The risk assessment’s novelty lies in the combination both the quantitative (statistics) and qualitative (subjective knowledge-based) aspects to model the attack and estimate the risk. The approach centers on estimations of assets, vulnerabilities, threats, controls, and associated outcomes in the event of a DDoS, together with a statistical analysis of the risk. Our main contribution is the process to combine the qualitative and quantitative estimation methods for cyber security risks, together with an insight into which technical details and variables to consider when risk assessing the DDoS amplification attack. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Springer Verlag | nb_NO |
dc.title | Cyber security risk assessment of a DDoS attack | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 183-202 | nb_NO |
dc.source.volume | 9866 | nb_NO |
dc.source.journal | Lecture Notes in Computer Science | nb_NO |
dc.identifier.doi | 10.1007/978-3-319-45871-7_12 | |
dc.identifier.cristin | 1408380 | |
dc.description.localcode | This is a post-peer-review, pre-copyedit version of an article published in [International Conference on Information Security]. The final authenticated version is available online at: https://link.springer.com/chapter/10.1007%2F978-3-319-45871-7_12 | nb_NO |
cristin.unitcode | 194,18,21,80 | |
cristin.unitcode | 194,18,24,10 | |
cristin.unitname | Norwegian Information Security Lab | |
cristin.unitname | IT-seksjonen Gjøvik | |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 | |