2016
DOI: 10.14569/ijacsa.2016.070194
|View full text |Cite
|
Sign up to set email alerts
|

Risk Propagation Analysis and Visualization using Percolation Theory

Abstract: Abstract-This article presents a percolation-based approach for the analysis of risk propagation, using malware spreading as a showcase example. Conventional risk management is often driven by human (subjective) assessment of how one risk influences the other, respectively, how security incidents can affect subsequent problems in interconnected (sub)systems of an infrastructure. Using percolation theory, a well-established methodology in the fields of epidemiology and disease spreading, a simple simulationbase… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…Other scientific publications use well established techniques (such as bar charts, point diagrams, and line charts) and link these (e.g., Lessler et al, 2011). Further publications focus on spatial interaction in the context of network theory, which is commonly depicted by connectivity matrices and graphs (Guo, 2007;König et al, 2016). Spatial interaction often comprises spatial aspects, but topological characteristics of the interaction network are in most cases more important.…”
Section: Related Workmentioning
confidence: 99%
“…Other scientific publications use well established techniques (such as bar charts, point diagrams, and line charts) and link these (e.g., Lessler et al, 2011). Further publications focus on spatial interaction in the context of network theory, which is commonly depicted by connectivity matrices and graphs (Guo, 2007;König et al, 2016). Spatial interaction often comprises spatial aspects, but topological characteristics of the interaction network are in most cases more important.…”
Section: Related Workmentioning
confidence: 99%
“…When it comes to analyzing the risk within the whole network of critical infrastructures, the cascading effects stemming directly from these interdependencies are an important factor. Identifying and assessing them is crucial and several methodologies have been presented in the past years [35,11,24,22,23]. These methodologies are applicable also for the analysis of cascading effects in maritime supply chains, since the interdependencies are the same as in the context of general critical infrastructures.…”
Section: Standards and Guidelinesmentioning
confidence: 99%
“…Epidemic models were initially used to study malware propagation in information systems [ 17 ]. The propagation of cybersecurity incidents in a CPS is viewed as an epidemic outbreak in Reference [ 23 ] and is analyzed using percolation theory. The method was shown to be applicable for studying malware infection incidents, but it is questionable whether the epidemic outbreak model fits other types of incidents.…”
Section: Related Workmentioning
confidence: 99%