%0 Conference Proceedings %T Security Assessment of Computer Networks Based on Attack Graphs and Security Events %+ Science of St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS ) %A Kotenko, Igor %A Doynikova, Elena %Z Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014 %< avec comité de lecture %( Lecture Notes in Computer Science %B 2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia) %C Bali, Indonesia %Y David Hutchison %Y Takeo Kanade %Y Bernhard Steffen %Y Demetri Terzopoulos %Y Doug Tygar %Y Gerhard Weikum %Y Linawati %Y Made Sudiana Mahendra %Y Erich J. Neuhold %Y A Min Tjoa %Y Ilsun You %Y Josef Kittler %Y Jon M. Kleinberg %Y Alfred Kobsa %Y Friedemann Mattern %Y John C. Mitchell %Y Moni Naor %Y Oscar Nierstrasz %Y C. Pandu Rangan %I Springer %3 Information and Communication Technology %V LNCS-8407 %P 462-471 %8 2014-04-14 %D 2014 %R 10.1007/978-3-642-55032-4_47 %K cyber situational awareness %K security metrics %K security metrics taxonomy %K attack graphs %K SIEM-systems %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X Security assessment is an important task for operation of modern computer networks. The paper suggests the security assessment technique based on attack graphs which can be implemented in contemporary SIEM systems. It is based on the security metrics taxonomy and different techniques for calculation of security metrics according to the data about current events. Proposed metrics form the basis for security awareness and reflect current security situation, including development of attacks, attacks sources and targets, attackers’ characteristics. The technique suggested is demonstrated on a case study. %G English %Z TC 5 %Z TC 8 %2 https://inria.hal.science/hal-01397255/document %2 https://inria.hal.science/hal-01397255/file/978-3-642-55032-4_47_Chapter.pdf %L hal-01397255 %U https://inria.hal.science/hal-01397255 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-TC8 %~ IFIP-ICT-EURASIA %~ IFIP-LNCS-8407