A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
Measuring network security using dynamic bayesian network
2008
Proceedings of the 4th ACM workshop on Quality of protection - QoP '08
This novel model provides a theoretical foundation and a practical framework for continuously measuring network security in a dynamic environment. ability Scoring System (CVSS) [7] . ...
In this paper, we propose a Dynamic Bayesian Networks (DBNs)-based model to incorporate temporal factors, such as the availability of exploit codes or patches. ...
This material is based upon work supported by National Institute of Standards and Technology Computer Security Division; by Homeland Security Advanced Re- ...
doi:10.1145/1456362.1456368
dblp:conf/ccs/FrigaultWSJ08
fatcat:pxqqu3lymbhjpilaopnipnsmru
INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS
2014
International Journal of Research in Engineering and Technology
The Dynamic Bayesian Network models help to detect the uncertain relationship associated with the risk event. ...
In this paper, a novel approach is presented; where Dynamic Bayesian Network models are constructed to identify multi stage attacks. ...
A Dynamic Bayesian Network is made up with related time slices of fixed Bayesian networks. ...
doi:10.15623/ijret.2014.0319055
fatcat:2ofmvrw53jectoeyng3u7oypya
Network Information Security Situation Assessment Based on Bayesian Network
2016
International Journal of Security and Its Applications
The situation of information security is difficult to be precise, autonomous and controllable. In this situation, the situation of the system is based on Fuzzy Dynamic Bayesian network. ...
The simulation results are compared with that of static Bayesian network model. The experimental results show that this method can better reflect the dynamic changes of network space operations. ...
Fuzzy dynamic Bayesian network (fuzzy dynamic Bayesian network) is in recent years space situation assessment using the method of field of a development direction, when the trend of sensor information ...
doi:10.14257/ijsia.2016.10.5.12
fatcat:6xrd2ob245b3viu4hqtzcwxmy4
A Bayesian network to manage risks of maritime piracy against offshore oil fields
2014
Safety Science
The potential of Bayesian networks is used to manage this large number of parameters and identify appropriate counter-measures. ...
The use of dynamic Bayesian networks is a way to explore. ...
A dynamic Bayesian network is a factored representation of a Bayesian network whose nodes are indexed by time on a discrete scale. ...
doi:10.1016/j.ssci.2014.04.010
fatcat:t6abtysuvrghlgw5quvigiya2e
Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
2020
Journal of Information Security
Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures ...
The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce ...
Network security issues can be displayed and resolved using the Bayesian network design model. ...
doi:10.4236/jis.2020.113008
fatcat:gawqxdsamfgyhgump3avab4hz4
A New Method of Network Risk Assessment Based on Bayesian Model
2021
DEStech Transactions on Computer Science and Engineering
In order to assist network administrators to assess network security risks, a new Bayesian model of network risk assessment method is proposed. ...
Finally, combined with the detected attacks, the cluster tree propagation algorithm is used to dynamically calculate the posterior risk probability of nodes, so as to evaluate the network risk in real ...
[7] used Bayesian network to analyze network security, they considered the attack events, but this method did not further calculate the posterior probability of the nodes observing the attack events ...
doi:10.12783/dtcse/ccnt2020/35444
fatcat:3gkbusifmvg7llvgt476q76vte
Support Tool for a Bayesian Network Based Critical Infrastructure Risk Model
[chapter]
2014
Studies in Computational Intelligence
While Bayesian networks provide a great theoretical basis for CI risk monitoring, tool support to cover the challenges in this field is missing. ...
This work presents a tool implementing a previously published Bayesian network based CI risk model which attempts to address the challenges of interdependent CI risk monitoring. ...
of interdependencies using Dynamic Bayesian networks (DBNs). ...
doi:10.1007/978-3-319-01460-9_3
fatcat:pcohmw5crvdy5oydl2h53w7wpa
Dynamic Security Risk Management Using Bayesian Attack Graphs
2012
IEEE Transactions on Dependable and Secure Computing
Index Terms-security risk assessment, mitigation analysis, bayesian belief networks, attack graph. ! ...
In this paper, we propose a risk management framework using Bayesian networks that enable a system administrator to quantify the chances of network compromise at various levels. ...
In this manner, they model the security of dynamically changing networks. Xie et al. [33] also use Bayesian networks for security risk analysis of networked systems. ...
doi:10.1109/tdsc.2011.34
fatcat:uz5hwggzxrhstjiv6usdvadwti
INTRUSION DEFENSE MECHANISM USING ARTIFICIAL IMMUNE SYSTEM IN CLOUD COMPUTING (CLOUD SECURITY USING COMPUTATIONAL INTELLIGENCE)
2017
Asian Journal of Pharmaceutical and Clinical Research
Cloud is a general term used in organizations that host various service and deployment models. As cloud computing offers everything a service,it suffers from serious security issues. ...
This security strategy is based on artificial immune algorithm. ...
In this way, we present the system dynamic Bayesian network. For the most part, the seriousness of the interlopers is disregarded in the system measurements. ...
doi:10.22159/ajpcr.2017.v10s1.19602
fatcat:7oib54le6vdvjknuhg7dltwooi
Telecommunications Networks Risk Assessment with Bayesian Networks
[chapter]
2013
Lecture Notes in Computer Science
This risk signature of the system enables the operator to make an informed decision about which network elements shall be used in order to provide a service requested by the user while minimising security ...
Each network component and path can be potentially used to compromise information, since an adversary is able to utilise various vulnerabilities of network elements in order to perform an attack. ...
Dynamically constructed Bayesian networks make it possible to assess the risk of functioning of any particular service. ...
doi:10.1007/978-3-642-40925-7_26
fatcat:5uxswgogvzg7pnspbffvesd5dy
An Adaptive Decision-Support Model for Data Communication Network Security Risk Management
2014
International Journal of Computer Applications
operational network behavior, portray security measurements and properties of the network accurately and consequently incorporate relevant objects of significance to the network security risk management ...
The proposed model will predetermine the effect of network security risk factors on the network Confidentiality, Integrity and Availability. ...
More recently, the problem of Security risk assessment and mitigation was addressed in [14] by proposing a dynamic security risk management using Bayesian Attack Graphs (BAG). ...
doi:10.5120/18537-9752
fatcat:nzg6rwduyzecvpngj4gdjpl5fa
BAYES AĞI VE BULANIK ÇIKARIM SİSTEMİ TABANLI BİR BİLGİ GÜVENLİĞİ RİSK DEĞERLENDİRME MODELİ
2019
Ege Stratejik Araştırmalar Dergisi
This study proposes a novel information security risk assessment approach based on Bayesian network and Fuzzy Inference System in order to evaluate and calculate both qualitative and / or quantitative ...
Hence, in this study, in order to evaluate and calculate both qualitative and quantitative risks, an information security risk assessment approach is proposed based on Bayesian network and fuzzy inference ...
Bayesian Networks are also used for network security solutions. Frigault et al. (2008) have developed a model by using dynamic Bayesian network for measuring network security. ...
doi:10.18354/esam.507794
fatcat:vpmurfj35bbw7brzvsdvjyvbpq
A Novel Attack Graph Posterior Inference Model Based on Bayesian Network
2011
Journal of Information Security
cannot be used to infer both the current and the future security state of a network. ...
Network attack graphs are originally used to evaluate what the worst security state is when a concerned network is under attack. ...
Acknowledgements The authors would also like to thank all the members of Shanghai Key Laboratory for Information Security Integrated Management Technology Research. ...
doi:10.4236/jis.2011.21002
fatcat:s5qcqbttyzco3llr7olqdjomfa
Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems
2018
IEEE Transactions on Computational Social Systems
In this paper, we investigate the potential risks in social networks using a hybrid Bayesian risk graph (HBRG) model to analyse the temporal attack activity patterns in dynamic cyber-physical social networks ...
The increasing influence of cyber systems and social networks is also a high risk for security threats. ...
using a security filter. ...
doi:10.1109/tcss.2018.2858440
fatcat:bwlrahgzcjfn7a4abrju2z7gvq
Game Theory for Network Security
2013
IEEE Communications Surveys and Tutorials
In this paper, we review the existing game-theory based solutions for network security problems, classifying their application scenarios under two categories, attack-defense analysis and security measurement ...
Game theoretic approaches have been introduced as a useful tool to handle those tricky network attacks. ...
Network security measurement is a large category that includes the measurement of every aspect of network security. Risk assessment [11] is one of these measures. ...
doi:10.1109/surv.2012.062612.00056
fatcat:wn7l3y2sgvaqvaneotfzhaxzoy
« Previous
Showing results 1 — 15 out of 28,503 results