[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/HICSS.2009.141guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models

Published: 05 January 2009 Publication History

Abstract

To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after potential investments. This paper presents a model based assessment framework for analyzing the cyber security provided by different architectural scenarios. The framework uses the Bayesian statistics based Extended Influence Diagrams to express attack graphs and related countermeasures. In this paper it is demonstrated how this structure can be captured in an abstract model to support analysis based on architectural models. The approach allows calculating the probability that attacks will succeed and the expected loss of these given the instantiated architectural scenario. Moreover, the framework can handle the uncertainties that are accompanied to the analyses. In architectural analysis there are uncertainties acquainted both to the scenario and its properties, as well as to the analysis framework that stipulates how security countermeasures contribute to cyber security.

Cited By

View all
  • (2018)Mission-Centric Automated Cyber Red TeamingProceedings of the 13th International Conference on Availability, Reliability and Security10.1145/3230833.3234688(1-11)Online publication date: 27-Aug-2018
  • (2018)Decision Networks for Security Risk Assessment of Critical InfrastructuresACM Transactions on Internet Technology10.1145/313757018:3(1-22)Online publication date: 6-Mar-2018
  • (2018)An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack PerceptionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2017.277123813:5(1110-1122)Online publication date: 25-Dec-2018
  • Show More Cited By

Index Terms

  1. Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Please enable JavaScript to view thecomments powered by Disqus.

            Information & Contributors

            Information

            Published In

            cover image Guide Proceedings
            HICSS '09: Proceedings of the 42nd Hawaii International Conference on System Sciences
            January 2009
            4812 pages
            ISBN:9780769534503

            Publisher

            IEEE Computer Society

            United States

            Publication History

            Published: 05 January 2009

            Qualifiers

            • Article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 21 Dec 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2018)Mission-Centric Automated Cyber Red TeamingProceedings of the 13th International Conference on Availability, Reliability and Security10.1145/3230833.3234688(1-11)Online publication date: 27-Aug-2018
            • (2018)Decision Networks for Security Risk Assessment of Critical InfrastructuresACM Transactions on Internet Technology10.1145/313757018:3(1-22)Online publication date: 6-Mar-2018
            • (2018)An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack PerceptionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2017.277123813:5(1110-1122)Online publication date: 25-Dec-2018
            • (2014)DAG-based attack and defense modelingComputer Science Review10.1016/j.cosrev.2014.07.00113:C(1-38)Online publication date: 1-Nov-2014

            View Options

            View options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media