A Dynamic Risk Assessment and Mitigation Model

被引:0
作者
Cheimonidis, Pavlos [1 ]
Rantos, Konstantinos [1 ]
机构
[1] Democritus Univ Thrace, Dept Informat, Kavala 65404, Greece
来源
APPLIED SCIENCES-BASEL | 2025年 / 15卷 / 04期
关键词
cybersecurity; cyber risk assessment; dynamic risk assessment; Bayesian networks; fuzzy cognitive maps; cyber risk mitigation;
D O I
10.3390/app15042171
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In the current operational landscape, organizations face a growing and diverse array of cybersecurity challenges, necessitating the development and implementation of innovative and effective security solutions. This paper presents a novel methodology for dynamic risk assessment and mitigation suggestions aimed at assessing and reducing cyber risks. The proposed approach gathers information from publicly available cybersecurity-related open sources and integrates it with environment-specific data to generate a comprehensive understanding of potential risks. It creates multiple distinct risk scenarios based on the identification of vulnerabilities, network topology, and the attacker's perspective. The methodology employs Bayesian networks to proactively and dynamically estimate the probability of threats and Fuzzy Cognitive Maps to dynamically update vulnerability severity values for each risk scenario. These elements are combined with impact estimations to provide dynamic risk assessments. Furthermore, the methodology offers mitigation suggestions for each identified vulnerability across all risk scenarios, enabling organizations to effectively address the assessed cybersecurity risks. To validate the effectiveness of the proposed methodology, a case study is presented, demonstrating its practical application and efficacy.
引用
收藏
页数:28
相关论文
共 52 条
[1]   A Novel Architecture for Predictive CyberSecurity using non-homogenous Markov Models [J].
Abraham, Subil ;
Nair, Suku .
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, :774-781
[2]  
Aghaei Ehsan., 2019, Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, P1
[3]   A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate [J].
Agrafiotis, Ioannis ;
Nurse, Jason R. C. ;
Goldsmith, Michael ;
Creese, Sadie ;
Upton, David .
JOURNAL OF CYBERSECURITY, 2018, 4 (01)
[4]  
Al-Araji ZJ, 2022, KARBALA INT J MOD SC, V8, P313, DOI 10.33640/2405-609x.3235
[5]  
Alhomidi Mohammed., 2014, International Journal of Network Security Its Applications, V6, P31, DOI 10.5121/ijnsa.2014.6303
[6]  
[Anonymous], 2024, GeNIe modeler and SMILE engine
[7]  
[Anonymous], 2021, Common Vulnerabilities and Exposures (CVE)
[8]  
[Anonymous], National Vulnerability Database
[9]  
[Anonymous], 2018, Risk management-Guidelines
[10]   Fuzzy cognitive maps in systems risk analysis: a comprehensive review [J].
Bakhtavar, Ezzeddin ;
Valipour, Mahsa ;
Yousefi, Samuel ;
Sadiq, Rehan ;
Hewage, Kasun .
COMPLEX & INTELLIGENT SYSTEMS, 2021, 7 (02) :621-637