Exploring security countermeasures along the attack sequence

Taketoshi Sakuraba, Bin Hui Chou, Seiichi Domyo, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

A Systematic method exploring security countermeasures is proposed. For each attack, one can consider the moments along the time sequence of the attack, and for each of the moments, one can define approaches of countermeasure design against the attack that is effective at the moment. One could extract new approaches from the existing counter-measures, and think of new countermeasures based on the new approaches against other threats and attacks.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
Pages427-432
Number of pages6
DOIs
Publication statusPublished - Sept 15 2008
Event2nd International Conference on Information Security and Assurance, ISA 2008 - Busan, Korea, Republic of
Duration: Apr 24 2008Apr 26 2008

Publication series

NameProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008

Other

Other2nd International Conference on Information Security and Assurance, ISA 2008
Country/TerritoryKorea, Republic of
CityBusan
Period4/24/084/26/08

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems and Management
  • Electrical and Electronic Engineering
  • Communication

Fingerprint

Dive into the research topics of 'Exploring security countermeasures along the attack sequence'. Together they form a unique fingerprint.

Cite this