A Threat Rislk Estimation Model for Computer N etworlk Security

被引:0
作者
Rezaee, Razieh [1 ]
Bafghi, Abbas Ghaemi [1 ]
Khosravi-Farmad, Masoud [1 ]
机构
[1] Ferdowsi Univ Mashhad, Dept Comp, Data & Commun Secur Lab, Mashhad, Khorasan Razavi, Iran
来源
2016 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE) | 2016年
关键词
security threat; analysis model; computer network; risk estimation; bayesian network; UML model;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Risk analysis of security threats in computer networks is one of the most challenging fields in network management. Security risk analysis is usually done by security experts. Although they utilize analysis tools such as scanners and analyzers, the need for expert is still inevitable. To reduce the need of security expertise for network administrator, yet performing security risk management, this paper proposes UML models to represent expert's security information. We propose a UML class diagram which is built up of necessary classes for security analysis of networks. These classes are the building blocks needed for estimation of probability and effects of security threats. This model is created once and represents the security information needed for analysis. To analyze any network, the needed objects should be instantiated from the provided classes. These objects form the security model of the network with all the threats and their risks specified in. To instantiate the objects of network security model, its information is needed. This information is usually available in documents of a network or is obtainable via automated scanners. We show the applicability of the proposed model on a test network. As the result, the security model of the network which contains its security threats and also their risks are obtained.
引用
收藏
页码:223 / 228
页数:6
相关论文
共 23 条
  • [1] Bopche GS, 2014, COMM COM INF SC, V467, P379
  • [2] Dalton G., 2006, INF ASS WORKSH 2006
  • [3] FIRST, 2007, COMPLETE GUIDE COMMO
  • [4] FIRST, 2014, COMM WEAKN SCOR SYST
  • [5] FIRST, 2014, COMM VULN SCOR SYST
  • [6] Frigault M., 2008, COMP SOFTW APPL 2008
  • [7] Holm H., 2014, DEPENDABLE AND SECUR, P1
  • [8] Quantifying security risk level from CVSS estimates of frequency and impact
    Houmb, Siv Hilde
    Franqueira, Virginia N. L.
    Engum, Erlend A.
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (09) : 1622 - 1634
  • [9] ISRAM: information security risk analysis method
    Karabacak, B
    Sogukpinar, I
    [J]. COMPUTERS & SECURITY, 2005, 24 (02) : 147 - 159
  • [10] Khosravi-Farmad M., 2014, COMP KNOWL ENG ICCKE