Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Karin Sallhammar is active.

Publication


Featured researches published by Karin Sallhammar.


symposium on applications and the internet | 2005

Using Stochastic Game Theory to Compute the Expected Behavior of Attackers

Karin Sallhammar; Svein Johan Knapskog; Bjarne E. Helvik

This paper presents ongoing work on using stochastic game theory as a mathematical tool for computing the expected behavior of attackers. The possible use of the Nash Equilibrium as a part of the transition probabilities in state transition models is defined and motivated. To demonstrate the approach, a simple example of an attack against a computer network is modelled and analyzed.


computational intelligence and security | 2005

Real-time risk assessment with network sensors and intrusion detection systems

André Årnes; Karin Sallhammar; Kjetil Haslum; Tønnes Brekne; Marie Elisabeth Gaup Moe; Svein Johan Knapskog

This paper considers a real-time risk assessment method for information systems and networks based on observations from networks sensors such as intrusion detection systems. The system risk is dynamically evaluated using hidden Markov models, providing a mechanism for handling data from sensors with different trustworthiness in terms of false positives and negatives. The method provides a higher level of abstraction for monitoring network security, suitable for risk management and intrusion response applications.


availability, reliability and security | 2006

Towards a stochastic model for integrated security and dependability evaluation

Karin Sallhammar; Bjarne E. Helvik; Svein Johan Knapskog

We present a new approach to integrated security and dependability evaluation, which is based on stochastic modelling techniques. Our proposal aims to provide operational measures of the trustworthiness of a system, regardless if the underlying failure cause is intentional or not. By viewing system states as elements in a stochastic game, we can compute the probabilities of expected attacker behavior, and thereby be able to model attacks as transitions between system states. The proposed game model is based on a reward-and cost concept. A section of the paper is devoted to the demonstration of how the expected attacker behavior is affected by the parameters of the game. Our model opens up for use traditional Markov analysis to make new types of probabilistic predictions for a system, such as its expected time to security failure.


dependable autonomic and secure computing | 2006

A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation

Karin Sallhammar; Bjarne E. Helvik; Svein Johan Knapskog

The complex networked computer systems of today are often vulnerable to a large number of failures, accidental as well as intentional. To be able to assess to what degree one can rely on such a system, new methods for quantitative evaluation is needed. This paper presents a stochastic model for integrated security and dependability evaluation, which models malicious attacker behavior as transitions between system states. To predict the probabilities of attack actions a game theoretic approach is applied. We demonstrate the method by computing security and dependability measures in two different case studies


Journal of Networks | 2006

On Stochastic Modeling for Integrated Security and Dependability Evaluation

Karin Sallhammar; Bjarne E. Helvik; Svein Johan Knapskog


In Proceedings of the 9th Nordic Workshop on Secure IT-systems (NordSec 2004) | 2004

Using Game Theory in Stochastic Models for Quantifying Security

Karin Sallhammar; Svein Johan Knapskog


International Journal of Computer Science and Network Security | 2007

A Framework for Predicting Security and Dependability Measures in Real-time

Karin Sallhammar; Bjarne E. Helvik; Svein Johan Knapskog


international workshop on security | 2005

Incorporating Attacker Behavior in Stochastic Models of Security

Karin Sallhammar; Bjarne E. Helvik; Svein Johan Knapskog


Archive | 2009

A method, system, and computer readable medium for controlling access to a memory in a memory device

Karin Sallhammar; Fritjof Engelhardtsen; Kjetil Haslum; Brynjar Viken


11th Nordic Workshop on Secure IT Systems | 2006

Real-time Risk Assessment with Network Sensors and Hidden Markov Models

André Årnes; Karin Sallhammar; Kjetil Haslum; Svein Johan Knapskog

Collaboration


Dive into the Karin Sallhammar's collaboration.

Top Co-Authors

Avatar

Svein Johan Knapskog

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Bjarne E. Helvik

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Kjetil Haslum

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

André Årnes

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Marie Elisabeth Gaup Moe

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Tønnes Brekne

Norwegian University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge