Intelligent Security and Risk Analysis in Network Systems

被引:0
|
作者
Mohammadian, Masoud [1 ]
机构
[1] Univ Canberra, Sch Informat Syst & Accounting, Canberra, ACT 2606, Australia
关键词
Data and Network Security; Attack Graphs; Attack Paths; Fuzzy Logic; Decision Making; Genetic Algorithms;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security architects devote a considerable time and efforts in improving the security of their data and networks. Attack graph are graphical representation of networks that can assist in documenting risks in network systems. Attack graphs need to be analysed and tested to remove security risks in a network. All comprising paths identified on an attack graph are listed for close attention and consideration of how to protect against possible attacks. There is a need for an automated system that can generate and evaluate attack paths and provide security architects with decision making tools that provides them with details of paths that an attacker may take to attack a network and cause damage and security breaches in their networks. Such an automated system can provide paths that can cause the most undesirable attacks. In this research paper an automated system using Fuzzy Cognitive Maps developed by Mohammadian [3] for identifying attack paths from attack graphs are presented. A novel decision making approach to determine time delay for an attacker to reach resources in a network is considered. A multilayer Fuzzy Logic is employed for the development of calculation of time delay for an attacker to reach a resource once it has access to a network.
引用
收藏
页码:825 / 830
页数:6
相关论文
共 50 条
  • [22] INTELLIGENT INFORMATION NETWORK SECURITY AND MANAGEMENT
    Yixian Yang
    Zhongshan Zhang
    Wenjing Li
    中国通信, 2016, 13 (07) : 3 - 6
  • [24] Security risk analysis in Web Services systems
    Gutierrez, Carlos
    Fernandez-Medina, Eduardo
    Piattini, Mario
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 425 - +
  • [25] A security risk analysis model for information systems
    In, HP
    Kim, YG
    Lee, T
    Moon, CJ
    Jung, YJ
    Kim, I
    SYSTEMS MODELING AND SIMULATION: THEORY AND APPLICATIONS, 2005, 3398 : 505 - 513
  • [26] Security Metrics and Risk Analysis for Enterprise Systems
    Singhal, Anoop
    PROCEEDINGS OF THE SIXTH INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA'20), 2020, : 1 - 1
  • [27] Security Risk Management in Cooperative Intelligent Transportation Systems: A Systematic Literature Review
    Affia, Abasi-Amefon O.
    Matulevicius, Raimundas
    Nolte, Alexander
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2019 CONFERENCES, 2019, 11877 : 282 - 300
  • [28] Frailty modelling for risk analysis in network security and survivability
    Ma Z.S.
    International Journal of Information and Computer Security, 2011, 4 (03) : 276 - 294
  • [29] Intelligent Transport Systems: Analysis of Applications, Security Challenges, and Robust Countermeasures
    Alharb, Mada
    Alabdulatif, Abdulatif
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (06) : 961 - 971
  • [30] Timing and Security Analysis of VANET-based Intelligent Transportation Systems
    Zheng, Bowen
    Sayin, Muhammed O.
    Lin, Chung-Wei
    Shiraishi, Shinichi
    Zhu, Qi
    2017 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2017, : 984 - 991