Bayesian Decision Network-Based Security Risk Management Framework

被引:28
作者
Khosravi-Farmad, Masoud [1 ]
Ghaemi-Bafghi, Abbas [1 ]
机构
[1] Ferdowsi Univ Mashhad, Dept Comp Engn, Data & Commun Secur Lab, Mashhad, Razavi Khorasan, Iran
关键词
Risk assessment; Risk mitigation; Risk management framework; Cost-benefit analysis; Decision making; Bayesian decision network; ATTACK GRAPH;
D O I
10.1007/s10922-020-09558-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security risk management is comprised of several essential processes, namely risk assessment, risk mitigation and risk validation and monitoring, which should be done accurately to maintain the overall security level of a network in an acceptable level. In this paper, an integrated framework for network security risk management is presented which is based on a probabilistic graphical model called Bayesian decision network (BDN). Using BDN, we model the information needed for managing security risks, such as information about vulnerabilities, risk-reducing countermeasures and the effects of implementing them on vulnerabilities, with the minimum need for expert's knowledge. In order to increase the accuracy of the proposed risk assessment process, vulnerabilities exploitation probability and impact of vulnerabilities exploitation on network assets are calculated using inherent, temporal and environmental factors. In the risk mitigation process, a cost-benefit analysis is efficiently done using modified Bayesian inference algorithms even in case of budget limitation. The experimental results show that network security level enhances significantly due to precise assessment and appropriate mitigation of risks.
引用
收藏
页码:1794 / 1819
页数:26
相关论文
共 50 条
[1]   Objective Risk Evaluation for Automated Security Management [J].
Ahmed, Mohammad Salim ;
Al-Shaer, Ehab ;
Taibah, Mohamed ;
Khan, Latifur .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2011, 19 (03) :343-366
[2]   Improving risk assessment model of cyber security using fuzzy logic inference system [J].
Alali, Mansour ;
Almogren, Ahmad ;
Hassan, Mohammad Mehedi ;
Rassan, Iehab A. L. ;
Bhuiyan, Md Zakirul Alam .
COMPUTERS & SECURITY, 2018, 74 :323-339
[3]  
Ammann P., 2002, P 9 ACM C COMP COMM, P217, DOI [DOI 10.1145/586110.586140, 10.1145/586110.586140]
[4]   Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk [J].
Awan, Malik Shahzad Kateem ;
Burnap, Pete ;
Rana, Omer .
COMPUTERS & SECURITY, 2016, 57 :31-46
[5]   Incorporating attacker capabilities in risk estimation and mitigation [J].
ben Othmane, Lotfi ;
Ranchal, Rohit ;
Fernando, Ruchith ;
Bhargava, Bharat ;
Bodden, Eric .
COMPUTERS & SECURITY, 2015, 51 :41-61
[6]   Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics [J].
Cheng, Pengsu ;
Wang, Lingyu ;
Jajodia, Sushil ;
Singhal, Anoop .
2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012), 2012, :31-40
[7]  
Corrie J, 2012, MISSION IN CONTEXT: EXPLORATIONS INSPIRED BY J. ANDREW KIRK, P1
[8]   An Online Risk Management Strategy for VoIP Enterprise Infrastructures [J].
Dabbebi, O. ;
Badonnel, R. ;
Festor, O. .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2015, 23 (01) :137-162
[9]   Exploring risk flow attack graph for security risk assessment [J].
Dai, Fangfang ;
Hu, Ying ;
Zheng, Kangfeng ;
Wu, Bin .
IET INFORMATION SECURITY, 2015, 9 (06) :344-353
[10]  
Dewri R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P204