Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Marie Elisabeth Gaup Moe is active.

Publication


Featured researches published by Marie Elisabeth Gaup Moe.


computational intelligence and security | 2005

Real-time risk assessment with network sensors and intrusion detection systems

André Årnes; Karin Sallhammar; Kjetil Haslum; Tønnes Brekne; Marie Elisabeth Gaup Moe; Svein Johan Knapskog

This paper considers a real-time risk assessment method for information systems and networks based on observations from networks sensors such as intrusion detection systems. The system risk is dynamically evaluated using hidden Markov models, providing a mechanism for handling data from sensors with different trustworthiness in terms of false positives and negatives. The method provides a higher level of abstraction for monitoring network security, suitable for risk management and intrusion response applications.


local computer networks | 2008

Real-time intrusion prevention and security analysis of networks using HMMs

Kjetil Haslum; Marie Elisabeth Gaup Moe; Svein Johan Knapskog

In this paper we propose to use a hidden Markov model (HMM) to model sensors for an intrusion prevention system (IPS). Observations from different sensors are aggregated in the HMM and the intrusion frequency security metric is estimated. We use a Markov model that captures the interaction between the attacker and the network to model and predict the next step of an attacker. A new HMM is created and used for updating the estimated system state for each observation, based on the sensor trustworthiness and the time since last observation processed. Our objective is to calculate and maintain a state probability distribution that can be used for intrusion prediction and prevention. We show how our sensor model can be applied to an IPS architecture based on intrusion detection system (IDS) sensors, real-time traffic surveillance and online risk assessment. Our approach is illustrated by a small case study.


international conference on wireless broadband and ultra wideband communications | 2007

Mitigating Flooding Attacks in Mobile Ad-hoc Networks Supporting Anonymous Communications

Venkat Balakrishnan; Vijay Varadharajan; Uday Tupakula; Marie Elisabeth Gaup Moe

Recently several techniques that provide different degree of anonymity have been proposed for wired and wireless communication. Although, the recently proposed techniques are successful in achieving high degree of anonymity, there are some disadvantages associated with the proposed techniques. In this paper we analyze the flooding and packet drop attacks in mobile ad hoc networks that support anonymous communication. Then we propose a novel technique to deal with the flooding attacks. Our approach can efficiently identify and isolate the malicious node that floods the network. In addition, our technique provides a mechanism to identify the benign behavior of an expelled node and rejoins the expelled node back into the network. Furthermore, our approach does not require any additional packets to communicate the behavior of the flooding node and hence does not incur any additional overhead. Finally we validate the performance analysis of our technique through NS2 simulations.


international conference on trust management | 2009

Comparison of the Beta and the Hidden Markov Models of Trust in Dynamic Environments

Marie Elisabeth Gaup Moe; Bjarne E. Helvik; Svein Johan Knapskog

Computational trust and reputation models are used to aid the decision-making process in complex dynamic environments, where we are unable to obtain perfect information about the interaction partners. In this paper we present a comparison of our proposed hidden Markov trust model to the Beta reputation system. The hidden Markov trust model takes the time between observations into account, it also distinguishes between system states and uses methods previously applied to intrusion detection for the prediction of which state an agent is in. We show that the hidden Markov trust model performs better when it comes to the detection of changes in behavior of agents, due to its larger richness in model features. This means that our trust model may be more realistic in dynamic environments. However, the increased model complexity also leads to bigger challenges in estimating parameter values for the model. We also show that the hidden Markov trust model can be parameterized so that it responds similarly to the Beta reputation system.


Electronic Notes in Theoretical Computer Science | 2009

Quantification of Anonymity for Mobile Ad Hoc Networks

Marie Elisabeth Gaup Moe

We propose a probabilistic system model for anonymous ad hoc routing protocols that takes into account the a priori knowledge of the adversary, and illustrate how the information theoretical entropy can be used for quantification of the anonymity offered by a routing protocol as the adversary captures an increasing number of nodes in the network. The proposed measurement schema is applied to ANODR and ARM routing protocols.


availability, reliability and security | 2016

Differentiating Cyber Risk of Insurance Customers: The Insurance Company Perspective

Inger Anne Tøndel; Fredrik Seehusen; Erlend Andreas Gjære; Marie Elisabeth Gaup Moe

As a basis for offering policy and setting tariffs, cyber-insurance carriers need to assess the cyber risk of companies. This paper explores the challenges insurance companies face in assessing cyber risk, based on literature and interviews with representatives from insurers. The interview subjects represent insurance companies offering cyber-insurance in a market where this is a new and unknown product. They have limited historical data, with few examples of incidents leading to payout. This lack of experience and data, together with the need for an efficient sales process, highly impacts their approach to risk assessment. Two options for improving the ability to perform thorough yet efficient assessments of cyber risk are explored in this paper: basing analysis on reusable sector-specific risk models, and including managed security service providers (MSSPs) in the value chain.


international workshop on security | 2017

Facing Uncertainty in Cyber Insurance Policies

Per Håkon Meland; Inger Anne Tøndel; Marie Elisabeth Gaup Moe; Fredrik Seehusen

Cyber insurance has gained less ground in Europe than in the U.S., but with emerging laws and regulations, the prospect of considerable fines for security breaches is pushing many organisations into this market. A qualitative interview study in Norway reveals the main uncertainty factors for organisations that have little experience with the cyber insurance consideration process, and how they perceive the products, process and expected support in case of a cyber incident. These uncertainty factors can be reduced by being aware of typical coverage gaps, exclusions and loss types that are commonly found in cyber insurance products.


The 13th Nordic Workshop on Secure IT Systems (NordSec2008). Copenhagen, Denmark. October 9-10, 2008. | 2008

Learning Trust in Dynamic Multiagent Environments using HMMs.

Marie Elisabeth Gaup Moe; Mozhgan Tavakolifard; Svein Johan Knapskog


33 | 2018

Cybersikkerhet i digitale transformatorstasjoner. Forprosjekt

Martin Gilje Jaatun; Marie Elisabeth Gaup Moe; Maren Kristine Istad


Archive | 2009

Security, Privacy and Trust in Dynamic Networks

Marie Elisabeth Gaup Moe

Collaboration


Dive into the Marie Elisabeth Gaup Moe's collaboration.

Top Co-Authors

Avatar

Svein Johan Knapskog

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Bjarne E. Helvik

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Kjetil Haslum

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

André Årnes

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Karin Sallhammar

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Mozhgan Tavakolifard

Norwegian University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge