Reference Hub1
Security Assessment of Networks

Security Assessment of Networks

Aftab Ahmad
ISBN13: 9781609607777|ISBN10: 1609607775|EISBN13: 9781609607784
DOI: 10.4018/978-1-60960-777-7.ch007
Cite Chapter Cite Chapter

MLA

Ahmad, Aftab. "Security Assessment of Networks." Network Security, Administration and Management: Advancing Technology and Practice, edited by Dulal Chandra Kar and Mahbubur Rahman Syed, IGI Global, 2011, pp. 115-130. https://doi.org/10.4018/978-1-60960-777-7.ch007

APA

Ahmad, A. (2011). Security Assessment of Networks. In D. Kar & M. Syed (Eds.), Network Security, Administration and Management: Advancing Technology and Practice (pp. 115-130). IGI Global. https://doi.org/10.4018/978-1-60960-777-7.ch007

Chicago

Ahmad, Aftab. "Security Assessment of Networks." In Network Security, Administration and Management: Advancing Technology and Practice, edited by Dulal Chandra Kar and Mahbubur Rahman Syed, 115-130. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-777-7.ch007

Export Reference

Mendeley
Favorite

Abstract

In this chapter, a novel performance model for assessing security of a layered network has been proposed. The work is motivated by the fact that there is a need for a reference framework to account for all threats to a networked system. There are few such models available, and one of them is recommended by the International Telecommunications Union (ITU). The proposed assessment model is based on the ITU security framework, recommended in the ITU-T Recommendation X.805. We employ this model to quantify network security against five threat categories mentioned in the recommendations. The quantification has been done based on the recommended measures against all threats. A threat vector has been proposed that defines required measures for a particular threat category. Other vectors, such as the security implementation vector define how effectively these measures are implemented in a given device, system, or network. As a simple application of the proposed model, the security provided by the IEEE 802.15.4 standard is analyzed, viewing it as an ‘end-to-end’ system (e.g., for ad hoc sensor network applications). The proposed security assessment model can be applied to any type of network (wireless, wired, optical, service oriented, transport, etc.). The model can be employed to obtain security assessment in the form of five security metrics, one for each threat category (destruction, corruption, removal, disclosure, and interruption). An expression for the overall security against all threats has also been derived.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.