skip to main content
10.1145/2459976.2460002acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Relationships between information security metrics: an empirical study

Published: 08 January 2013 Publication History

Abstract

Finding relevant metrics in information security is an important but difficult problem. In this paper, we propose to empirically investigate the relevance of different security metrics that could be derived from intrusion prevention system (IPS) alert events and computer security incident data. Based on the data provided by the University of Maryland, we show that IPS metrics are linked to security incidents, and also that different types of security incidents have different significant metrics. These results can be used for identifying possible candidates for security incident indicators, developing methods to improve incident prevention and helping organizations interpret their IPS's better in the future.

References

[1]
M. Benini and S. Sicari. Risk assessment in practice: A real case study. Computer Communications, 31(15):3691--3699, 2008.
[2]
W. Boyer and M. McQueen. Ideal based cyber security technical metrics for control systems. In Critical Information Infrastructures Security, volume 5141 of Lecture Notes in Computer Science, pages 246--260. Springer Berlin/Heidelberg, 2008.
[3]
D. Chrun, M. Cukier, and G. Sneeringer. On the use of security metrics based on intrusion prevention system event data: An empirical analysis. In HASE '08: Proceedings of the 2008 11th IEEE High Assurance Systems Engineering Symposium, pages 49--58, 2008.
[4]
M. Howard, J. Pincus, and J. Wing. Measuring relative attack surfaces. Computer Security in the 21st Century, pages 109--137, 2005.
[5]
W. Jansen. Directions in security metrics research. Technical report, National Institute of Standards and Technology (NIST), 2009.
[6]
A. Jaquith. Security metrics: replacing fear, uncertainty, and doubt. Addison-Wesley Professional, 2007.
[7]
M. Swanson, N. Bartol, J. Sabato, J. Hash, and L. Graffo. Performance measurement guide for information security. Technical report, NIST Special Publication 800--55, 2003.
[8]
The Center for Internet Security. The cis security metrics v1.1.0, November 2010.
[9]
V. Verendel. Quantified security is a weak hypothesis: a critical survey of results and assumptions. In NSPW '09: Proceedings of the 2009 workshop on New security paradigms workshop, pages 37--50, 2009.
[10]
C. Wang and W. Wulf. A framework for security measurement. In Proc. National Information Systems Security Conference, Baltimore, MD, pages 522--533. Citeseer, 1997.
[11]
L. Wang, A. Singhal, and S. Jajodia. Measuring the overall security of network configurations using attack graphs. In Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security, pages 98--112. Springer-Verlag, 2007.
[12]
J. Zalewski, S. Drager, W. Mckeever, and A. Kornecki. Can we measure security and how? In Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW '11, 2011.

Cited By

View all
  • (2019)Decision Model for the Security and Utility Risk Evaluation (SURE) FrameworkProceedings of the Australasian Computer Science Week Multiconference10.1145/3290688.3290694(1-11)Online publication date: 29-Jan-2019
  • (2015)A Practical Experience on Evaluating Intrusion Prevention System Event Data as Indicators of Security IssuesProceedings of the 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS)10.1109/SRDS.2015.17(296-305)Online publication date: 28-Sep-2015
  • (2015)High-Level Simulation for Multiple Fault Injection EvaluationData Privacy Management, Autonomous Spontaneous Security, and Security Assurance10.1007/978-3-319-17016-9_19(293-308)Online publication date: 28-Mar-2015

Index Terms

  1. Relationships between information security metrics: an empirical study

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
      January 2013
      282 pages
      ISBN:9781450316873
      DOI:10.1145/2459976

      Sponsors

      • Los Alamos National Labs: Los Alamos National Labs
      • Sandia National Labs: Sandia National Laboratories
      • DOE: Department of Energy
      • Oak Ridge National Laboratory
      • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
      • BERKELEYLAB: Lawrence National Berkeley Laboratory
      • Argonne Natl Lab: Argonne National Lab
      • Idaho National Lab.: Idaho National Laboratory
      • Pacific Northwest National Laboratory
      • Nevada National Security Site: Nevada National Security Site

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 January 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. empirical study
      2. intrusion prevention systems
      3. network and security management
      4. security incidents
      5. security metrics

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CSIIRW '13
      Sponsor:
      • Los Alamos National Labs
      • Sandia National Labs
      • DOE
      • Lawrence Livermore National Lab.
      • BERKELEYLAB
      • Argonne Natl Lab
      • Idaho National Lab.
      • Nevada National Security Site
      CSIIRW '13: Cyber Security and Information Intelligence
      January 8 - 10, 2013
      Tennessee, Oak Ridge, USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 07 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2019)Decision Model for the Security and Utility Risk Evaluation (SURE) FrameworkProceedings of the Australasian Computer Science Week Multiconference10.1145/3290688.3290694(1-11)Online publication date: 29-Jan-2019
      • (2015)A Practical Experience on Evaluating Intrusion Prevention System Event Data as Indicators of Security IssuesProceedings of the 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS)10.1109/SRDS.2015.17(296-305)Online publication date: 28-Sep-2015
      • (2015)High-Level Simulation for Multiple Fault Injection EvaluationData Privacy Management, Autonomous Spontaneous Security, and Security Assurance10.1007/978-3-319-17016-9_19(293-308)Online publication date: 28-Mar-2015

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media