By Topic

Estimating Potential IT Security Losses: An Alternative Quantitative Approach

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Lee, Vincent C S ; Monash Univ., Clayton, Vic. ; Linyi Shao

In this article, we look at the potential relationship between the cost of IT security breaches and port-scan records - specifically, we postulate that the irregular movement of port-scan records is quite similar to stock exchange price dynamics, which have been partially satisfied with stochastic movement and Poisson arrival processing. By intuition, stochastic process methodology can emulate an enterprise's information IT security situation. Our proposed generic approach provides a reasonable procedure to estimate and evaluate IT security risk through data mining of port-scan logs

Published in:

Security & Privacy, IEEE  (Volume:4 ,  Issue: 6 )