Filters








28,503 Hits in 4.4 sec

Measuring network security using dynamic bayesian network

Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia
2008 Proceedings of the 4th ACM workshop on Quality of protection - QoP '08  
This novel model provides a theoretical foundation and a practical framework for continuously measuring network security in a dynamic environment. ability Scoring System (CVSS) [7] .  ...  In this paper, we propose a Dynamic Bayesian Networks (DBNs)-based model to incorporate temporal factors, such as the availability of exploit codes or patches.  ...  This material is based upon work supported by National Institute of Standards and Technology Computer Security Division; by Homeland Security Advanced Re-  ... 
doi:10.1145/1456362.1456368 dblp:conf/ccs/FrigaultWSJ08 fatcat:pxqqu3lymbhjpilaopnipnsmru

INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS

R. Sarala .
2014 International Journal of Research in Engineering and Technology  
The Dynamic Bayesian Network models help to detect the uncertain relationship associated with the risk event.  ...  In this paper, a novel approach is presented; where Dynamic Bayesian Network models are constructed to identify multi stage attacks.  ...  A Dynamic Bayesian Network is made up with related time slices of fixed Bayesian networks.  ... 
doi:10.15623/ijret.2014.0319055 fatcat:2ofmvrw53jectoeyng3u7oypya

Network Information Security Situation Assessment Based on Bayesian Network

Wang Xing-zhu
2016 International Journal of Security and Its Applications  
The situation of information security is difficult to be precise, autonomous and controllable. In this situation, the situation of the system is based on Fuzzy Dynamic Bayesian network.  ...  The simulation results are compared with that of static Bayesian network model. The experimental results show that this method can better reflect the dynamic changes of network space operations.  ...  Fuzzy dynamic Bayesian network (fuzzy dynamic Bayesian network) is in recent years space situation assessment using the method of field of a development direction, when the trend of sensor information  ... 
doi:10.14257/ijsia.2016.10.5.12 fatcat:6xrd2ob245b3viu4hqtzcwxmy4

A Bayesian network to manage risks of maritime piracy against offshore oil fields

Amal Bouejla, Xavier Chaze, Franck Guarnieri, Aldo Napoli
2014 Safety Science  
The potential of Bayesian networks is used to manage this large number of parameters and identify appropriate counter-measures.  ...  The use of dynamic Bayesian networks is a way to explore.  ...  A dynamic Bayesian network is a factored representation of a Bayesian network whose nodes are indexed by time on a discrete scale.  ... 
doi:10.1016/j.ssci.2014.04.010 fatcat:t6abtysuvrghlgw5quvigiya2e

Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures

Rodney Alexander
2020 Journal of Information Security  
Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures  ...  The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce  ...  Network security issues can be displayed and resolved using the Bayesian network design model.  ... 
doi:10.4236/jis.2020.113008 fatcat:gawqxdsamfgyhgump3avab4hz4

A New Method of Network Risk Assessment Based on Bayesian Model

Kunfu Wang, Wei Feng, Xing Li
2021 DEStech Transactions on Computer Science and Engineering  
In order to assist network administrators to assess network security risks, a new Bayesian model of network risk assessment method is proposed.  ...  Finally, combined with the detected attacks, the cluster tree propagation algorithm is used to dynamically calculate the posterior risk probability of nodes, so as to evaluate the network risk in real  ...  [7] used Bayesian network to analyze network security, they considered the attack events, but this method did not further calculate the posterior probability of the nodes observing the attack events  ... 
doi:10.12783/dtcse/ccnt2020/35444 fatcat:3gkbusifmvg7llvgt476q76vte

Support Tool for a Bayesian Network Based Critical Infrastructure Risk Model [chapter]

Thomas Schaberreiter, Pascal Bouvry, Juha Röning, Djamel Khadraoui
2014 Studies in Computational Intelligence  
While Bayesian networks provide a great theoretical basis for CI risk monitoring, tool support to cover the challenges in this field is missing.  ...  This work presents a tool implementing a previously published Bayesian network based CI risk model which attempts to address the challenges of interdependent CI risk monitoring.  ...  of interdependencies using Dynamic Bayesian networks (DBNs).  ... 
doi:10.1007/978-3-319-01460-9_3 fatcat:pcohmw5crvdy5oydl2h53w7wpa

Dynamic Security Risk Management Using Bayesian Attack Graphs

N. Poolsappasit, R. Dewri, I. Ray
2012 IEEE Transactions on Dependable and Secure Computing  
Index Terms-security risk assessment, mitigation analysis, bayesian belief networks, attack graph. !  ...  In this paper, we propose a risk management framework using Bayesian networks that enable a system administrator to quantify the chances of network compromise at various levels.  ...  In this manner, they model the security of dynamically changing networks. Xie et al. [33] also use Bayesian networks for security risk analysis of networked systems.  ... 
doi:10.1109/tdsc.2011.34 fatcat:uz5hwggzxrhstjiv6usdvadwti

INTRUSION DEFENSE MECHANISM USING ARTIFICIAL IMMUNE SYSTEM IN CLOUD COMPUTING (CLOUD SECURITY USING COMPUTATIONAL INTELLIGENCE)

Santhanalakshmi L, Sakkaravarthi R
2017 Asian Journal of Pharmaceutical and Clinical Research  
Cloud is a general term used in organizations that host various service and deployment models. As cloud computing offers everything a service,it suffers from serious security issues.  ...  This security strategy is based on artificial immune algorithm.  ...  In this way, we present the system dynamic Bayesian network. For the most part, the seriousness of the interlopers is disregarded in the system measurements.  ... 
doi:10.22159/ajpcr.2017.v10s1.19602 fatcat:7oib54le6vdvjknuhg7dltwooi

Telecommunications Networks Risk Assessment with Bayesian Networks [chapter]

Marcin Szpyrka, Bartosz Jasiul, Konrad Wrona, Filip Dziedzic
2013 Lecture Notes in Computer Science  
This risk signature of the system enables the operator to make an informed decision about which network elements shall be used in order to provide a service requested by the user while minimising security  ...  Each network component and path can be potentially used to compromise information, since an adversary is able to utilise various vulnerabilities of network elements in order to perform an attack.  ...  Dynamically constructed Bayesian networks make it possible to assess the risk of functioning of any particular service.  ... 
doi:10.1007/978-3-642-40925-7_26 fatcat:5uxswgogvzg7pnspbffvesd5dy

An Adaptive Decision-Support Model for Data Communication Network Security Risk Management

Akinyemi BodundeOdunola, Amoo Adekemi Olawumi, Olajubu Emmanuel Ajayi
2014 International Journal of Computer Applications  
operational network behavior, portray security measurements and properties of the network accurately and consequently incorporate relevant objects of significance to the network security risk management  ...  The proposed model will predetermine the effect of network security risk factors on the network Confidentiality, Integrity and Availability.  ...  More recently, the problem of Security risk assessment and mitigation was addressed in [14] by proposing a dynamic security risk management using Bayesian Attack Graphs (BAG).  ... 
doi:10.5120/18537-9752 fatcat:nzg6rwduyzecvpngj4gdjpl5fa

BAYES AĞI VE BULANIK ÇIKARIM SİSTEMİ TABANLI BİR BİLGİ GÜVENLİĞİ RİSK DEĞERLENDİRME MODELİ

Sevilay Beken, Mete Eminağaoğlu
2019 Ege Stratejik Araştırmalar Dergisi  
This study proposes a novel information security risk assessment approach based on Bayesian network and Fuzzy Inference System in order to evaluate and calculate both qualitative and / or quantitative  ...  Hence, in this study, in order to evaluate and calculate both qualitative and quantitative risks, an information security risk assessment approach is proposed based on Bayesian network and fuzzy inference  ...  Bayesian Networks are also used for network security solutions. Frigault et al. (2008) have developed a model by using dynamic Bayesian network for measuring network security.  ... 
doi:10.18354/esam.507794 fatcat:vpmurfj35bbw7brzvsdvjyvbpq

A Novel Attack Graph Posterior Inference Model Based on Bayesian Network

Shaojun Zhang, Shanshan Song
2011 Journal of Information Security  
cannot be used to infer both the current and the future security state of a network.  ...  Network attack graphs are originally used to evaluate what the worst security state is when a concerned network is under attack.  ...  Acknowledgements The authors would also like to thank all the members of Shanghai Key Laboratory for Information Security Integrated Management Technology Research.  ... 
doi:10.4236/jis.2011.21002 fatcat:s5qcqbttyzco3llr7olqdjomfa

Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems

2018 IEEE Transactions on Computational Social Systems  
In this paper, we investigate the potential risks in social networks using a hybrid Bayesian risk graph (HBRG) model to analyse the temporal attack activity patterns in dynamic cyber-physical social networks  ...  The increasing influence of cyber systems and social networks is also a high risk for security threats.  ...  using a security filter.  ... 
doi:10.1109/tcss.2018.2858440 fatcat:bwlrahgzcjfn7a4abrju2z7gvq

Game Theory for Network Security

Xiannuan Liang, Yang Xiao
2013 IEEE Communications Surveys and Tutorials  
In this paper, we review the existing game-theory based solutions for network security problems, classifying their application scenarios under two categories, attack-defense analysis and security measurement  ...  Game theoretic approaches have been introduced as a useful tool to handle those tricky network attacks.  ...  Network security measurement is a large category that includes the measurement of every aspect of network security. Risk assessment [11] is one of these measures.  ... 
doi:10.1109/surv.2012.062612.00056 fatcat:wn7l3y2sgvaqvaneotfzhaxzoy
« Previous Showing results 1 — 15 out of 28,503 results