2021
DOI: 10.4018/joeuc.20210701.oa3
|View full text |Cite
|
Sign up to set email alerts
|

Security Threat Modelling With Bayesian Networks and Sensitivity Analysis for IAAS Virtualization Stack

Abstract: Designing security mechanisms for cloud computing infrastructures has assumed importance with the widespread adoption of public clouds. Virtualization security is a crucial component of the overall cloud infrastructure security. In this article, the authors employ the concept of Bayesian networks and attack graphs to carry out sensitivity analysis on the different components involved in virtualization security for infrastructure as a service (IaaS) cloud infrastructures. They evaluate the Bayesian attack graph… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 42 publications
0
13
0
Order By: Relevance
“…The basic idea of the Bayesian optimal filtering algorithm is that if the probability function of the initial condition is known, all measurement information can be used to construct the probability function behind the condition. Therefore, any filtering can lead to the theoretical optimal estimate [ 23 ]. In mathematical language, it can be described as follows: …”
Section: Recommendation Algorithmmentioning
confidence: 99%
“…The basic idea of the Bayesian optimal filtering algorithm is that if the probability function of the initial condition is known, all measurement information can be used to construct the probability function behind the condition. Therefore, any filtering can lead to the theoretical optimal estimate [ 23 ]. In mathematical language, it can be described as follows: …”
Section: Recommendation Algorithmmentioning
confidence: 99%
“…The principle of Bayesian network classifiers is to exploit the ability of Bayesian networks to reason about problems [ 21 , 22 ]. First, all non-class attributes are fed into the Bayesian network.…”
Section: Relationship Between Chf and Cognitive Functionmentioning
confidence: 99%
“…The rate of change analysis also plays an important role in tax risk analysis, such as the change of sales rate expense to operate income ratio, which can reflect the change of enterprise operation (Asvija et al, 2021). When setting early warning indicators, only the fixed-value early warning can only screen single-enterprise enterprises with large fluctuations in the rate of change, which cannot well-reflect the industry law, and should compare the rate of change of its analysis object with the industry average rate of change.…”
Section: Analysis Of Intelligent Risk Management Algorithms For Fisca...mentioning
confidence: 99%