Towards a security event data taxonomy

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The information required to build appropriate impact models depends directly on the nature of the system. The information dealt by health care systems, for instance, is particularly different from the information obtained by energy, telecommunication, transportation, or water supply systems. It is therefore important to properly classify the data of security events according to the nature of the system. This paper proposes an event data classification based on four main aspects: (i) the system’s criticality, i.e., critical vs. non-critical; (ii) the geographical location of the target system, i.e., internal vs. external; (iii) the time at which the information is obtained and used by the attacker i.e., a priory vs. a posteriori; and (iv) the nature of the data, i.e., logical vs. physical. The ultimate goal of the proposed taxonomy is to help organizations in the assessment of their assets and events.

Cite

CITATION STYLE

APA

Gonzalez-Granadillo, G., Rubio-Hernán, J., & Garcia-Alfaro, J. (2018). Towards a security event data taxonomy. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10694 LNCS, pp. 29–45). Springer Verlag. https://doi.org/10.1007/978-3-319-76687-4_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free