A Method for Information Security Analysis Using Information Graphs

被引:0
|
作者
Mazur, Zygmunt [1 ]
Pec, Janusz [2 ]
机构
[1] Wroclaw Univ Sci & Technol, Fac Informat & Commun Technol, Dept Appl Informat, Wroclaw, Poland
[2] Cent Stat Off, Warsaw, Poland
关键词
Edge labeling; graph edge and vertex overloading; graph isomorphism; Hamilton cycle; information graph concatenation; information graph description language (MOBSIG); information graph reduction; information graphs; multi-edge; node labeling; potential security conflict; security conflict graph; topic graph;
D O I
10.1080/01969722.2022.2162739
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The paper defines the concept of an information graph and proposes its use to describe information links and analyze the information flow in any organization regarding information security. Research on information graphs in this aspect should be developed, especially in identifying "dangerous graph structures" such as the Hamiltonian graphs or cliques. Information graphs containing such a structure as a Hamilton cycle can be analyzed using results from the theory of finding and existence of Hamilton cycles, an essential branch of graph theory. The paper also describes a graph of potential security conflicts, a thematic graph, i.e. a specific information graph. Two theorems concerning the properties of information graphs are also proved.
引用
收藏
页码:678 / 692
页数:15
相关论文
共 50 条
  • [1] The Information Security System Synthesis Using the Graphs Theory
    Kustov, V. N.
    Yakovlev, V. V.
    Stankevich, T. L.
    [J]. PROCEEDINGS OF 2017 XX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2017, : 148 - 151
  • [2] Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures
    Grusho, N. A.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 922 - 931
  • [3] Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures
    N. A. Grusho
    [J]. Automatic Control and Computer Sciences, 2019, 53 : 922 - 931
  • [4] ISRAM: information security risk analysis method
    Karabacak, B
    Sogukpinar, I
    [J]. COMPUTERS & SECURITY, 2005, 24 (02) : 147 - 159
  • [5] Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs
    Johnson, Pontus
    Vernotte, Alexandre
    Gorton, Dan
    Ekstedt, Mathias
    Lagerstrom, Robert
    [J]. RISK ASSESSMENT AND RISK-DRIVEN QUALITY ASSURANCE, RISK 2016, 2017, 10224 : 37 - 52
  • [6] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252
  • [7] Information security risk assessment using the AHP method
    Zaburko, J.
    Szulzyk-Cieplak, J.
    [J]. IV INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN ENGINEERING SCIENCE (CMES'19), 2019, 710
  • [8] Information security for big data using the NTRUEncrypt method
    Khalid Yousif, Mohammed
    Dallalbashi, Zena Ez
    Kareem, Shahab Wahhab
    [J]. Measurement: Sensors, 2023, 27
  • [9] A Business Aware Information Security Risk Analysis Method
    Sadok, M.
    Spagnoletti, P.
    [J]. INFORMATION TECHNOLOGY AND INNOVATION TRENDS IN ORGANIZATIONS, 2011, : 453 - 460
  • [10] Analysis of Information Security of Distributed Information Systems
    Grusho, Alexander
    Grusho, Nick
    Levykin, Michael
    Timonina, Elena
    [J]. 2017 9TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2017, : 96 - 100