Risk assessment for a video surveillance system based on Fuzzy Cognitive Maps

被引:0
作者
Piotr Szwed
Pawel Skrzynski
Wojciech Chmiel
机构
[1] AGH University of Science and Technology,
[2] Department of Applied Computer Science,undefined
[3] AGH University of Science and Technology,undefined
[4] Department of Automatics and Biomedical Engineering,undefined
来源
Multimedia Tools and Applications | 2016年 / 75卷
关键词
Security; Risk assessment; Video surveillance; Fuzzy cognitive maps;
D O I
暂无
中图分类号
学科分类号
摘要
For various IT systems security is considered a key quality factor. In particular, it might be crucial for video surveillance systems, as their goal is to provide continuous protection of critical infrastructure and other facilities. Risk assessment is an important activity in security management; it aims at identifying assets, threats and vulnerabilities, analysis of implemented countermeasures and their effectiveness in mitigating risks. This paper discusses an application of a new risk assessment method, in which risk calculation is based on Fuzzy Cognitive Maps (FCMs) to a complex automated video surveillance system. FCMs are used to capture dependencies between assets and FCM based reasoning is applied to aggregate risks assigned to lower-level assets (e.g. cameras, hardware, software modules, communications, people) to such high level assets as services, maintained data and processes. Lessons learned indicate, that the proposed method is an efficient and low-cost approach, giving instantaneous feedback and enabling reasoning on effectiveness of security system.
引用
收藏
页码:10667 / 10690
页数:23
相关论文
共 43 条
  • [1] Aguilar J(2005)A survey about fuzzy cognitive maps papers (Invited Paper) Int J 3 27-33
  • [2] Baudrit C(2006)Joint propagation and exploitation of probabilistic and possibilistic information in risk assessment IEEE Trans Fuzzy Syst 14 593-608
  • [3] Dubois D(2006)Video-understanding framework for automatic behavior recognition Behav Res Methods 38 416-426
  • [4] Guyonnet D(2006)Hierarchical threat assessment and quantitative calculation method of network security threatening state J Softw 17 885-897
  • [5] Brémond F(2012)Realization of scenarios for video surveillance Image Process Commun 4 231-240
  • [6] Thonnat M(1997)Secure spread spectrum watermarking for multimedia IEEE Trans Image Process 6 1673-1687
  • [7] Zúñiga M(1995)An introduction to computer security: the NIST handbook Security 800 1-290
  • [8] Chen XZ(2008)The evolution of video surveillance: an overview Mach Vis Appl 19 279-290
  • [9] Chmiel W(2010)Problems with scoring methods and ordinal scales in risk assessment J Res Dev 54 1-10
  • [10] Kwiecień J(2011)Building scenarios with Fuzzy Cognitive Maps: an exploratory study of solar energy Futures 43 52-66