Network security risk assessmentYolanta BeresnevichieneFotios Tsifountidis
MULTI-AGENT NETWORK SECURITY RISK ASSESSMENT RESEARCH BASED ON ATTACK GRAPH This paper proposes a multi-agent network security risk assessment model based on attack graph. Firstly, this paper proposes the architecture of multi-agent risk assessment and gives the function design of the main and subsid...
This paper presents a causal assessment model based on Bayesian Belief Networks to analyze and quantify information security risks caused by various threat sources. The proposed model can be applied to a variety of information security evaluation tasks, risk assessment, software development projects, IT...
(2005). Information technology network security risk assessment and management frame- work for shipping companies. Maritime Policy and Management, 32(4), 421-432.Roumboutsos, A., Nikitakos, N., & Gritzalis, S. (2005). Information technology network security risk assessment and management ...
At last, we concluded that visualization is an important research of risk evaluation and situation analysis of network. 展开 关键词: correlation security assessment situational awareness visualization 会议名称: Anti-counterfeiting, Security, Identification, 2007 IEEE International Workshop on ...
Tobacco information systems network security risk assessment and prediction models include the establishment of Design for Six Sigma (DFSS) process-based network security risk assessment model and a semi-supervised classification learning-based network security risk prediction model. The calculation of inform...
This paper draws data mining technology based on association rules into the field of risk assessment, demonstrating a network security risk assessment model based on association rules. The model mines data from history vulnerability database to discover association rules of vulnerabilities, and it is ...
We find such an assessment should be done at least annually to ensure optimal network operation. The risks to every business are growing and hackers are probing organizations constantly. Knowing risk and addressing it is preferable to having a successful attacker make off with corporate data or ins...
network security risk analysiscomputer securitynetwork securityNetwork security risk analysis has received great attention within the scientific community, due to the current proliferation of network attacks and threats. Although, considerable effort has been placed on improving security best practices, ...
The Hidden Markov Model(HMM) for describing host security states was established to evaluate the real time security risk of network, whose input is Intrusion Detection System alers. The probability for host to be attacked was calculated by this model. Aimed at the attack alers, a new calculating...