2020
DOI: 10.1007/s10922-020-09558-5
|View full text |Cite
|
Sign up to set email alerts
|

Bayesian Decision Network-Based Security Risk Management Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(26 citation statements)
references
References 32 publications
0
26
0
Order By: Relevance
“…For fixed infrastructure networks, graphical representations, such as attack graphs, are developed to represent the possible attack paths by exploiting the vulnerability relationships. For these reasons, vulnerability analysis techniques based on directed graphs are frequently found in the literature [ 69 ]. However, despite their potential, these analysis techniques have been relegated to vulnerability analysis in computer networks.…”
Section: Related Workmentioning
confidence: 99%
“…For fixed infrastructure networks, graphical representations, such as attack graphs, are developed to represent the possible attack paths by exploiting the vulnerability relationships. For these reasons, vulnerability analysis techniques based on directed graphs are frequently found in the literature [ 69 ]. However, despite their potential, these analysis techniques have been relegated to vulnerability analysis in computer networks.…”
Section: Related Workmentioning
confidence: 99%
“…e security risk is a function of the likelihood of the occurrence of a threat event and its potential adverse impact. However, previous studies did not include this type of impact in their frameworks [19,22,23]; they considered only the impacts of single hosts [21] and did not consider relationships among impacts of vulnerability exploitations. is is different from the case of BAGs, which reflect causal relationships among vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, quantitative assessment most effectively supports cost-benefit analysis of alternative risk responses or courses of action [17]. In particular, in a network environment in which multiple systems are interconnected, graphical security models such as Bayesian attack graphs (BAGs) [18][19][20][21][22][23][24] are suitable for risk assessment. BAGs provide powerful tools that represent information about causal relationships among vulnerabilities while compensating for the drawback of the attack graph (AG), which cannot provide information on vulnerability exploiting probabilities, which is an essential factor for risk assessment [21].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The quantitative approaches tend to narrow down the scope of the studies to the cyber risk assessment. A Bayesian decision network (BDN) was applied to a framework for network security risk management [56]. The framework consists of several essential processes: risk assessment, risk mitigation, and risk validation and monitoring, which should be done accurately to improve the security level of a network.…”
Section: Quantitative Approaches To Cybersecurity Risk Managementmentioning
confidence: 99%