Network Security Risk Assessment Using Bayesian Belief Networks
Loading...
Files
Date
2010
Authors
Kondakçı, Süleyman
Journal Title
Journal ISSN
Volume Title
Publisher
Open Access Color
Green Open Access
No
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
This paper presents a causal assessment model based on Bayesian Belief Networks to analyze and quantify information security risks caused by various threat sources. The proposed model can be applied to a variety of information security evaluation tasks, risk assessment, software development projects, IT products, and other decision making systems. This unique concept can also be used for the determination of joint risk propagation and interdependence structures within computer networks, information systems, and other engineering tasks in general. By this manner, we can facilitate the determination of probabilistic outputs caused by some precalculated input probabilities or by marginal/joint probabilities found so far within the chain of an interdependence structure. © 2010 IEEE.
Description
IEEE Computer Society
2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010 -- 20 August 2010 through 22 August 2010 -- Minneapolis, MN -- 82366
2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010 -- 20 August 2010 through 22 August 2010 -- Minneapolis, MN -- 82366
Keywords
Information security, Quantitative risk assessment, Risk modeling, Threat modeling, Assessment models, Bayesian Belief Networks, Decision-making systems, Engineering tasks, Information security, IT products, Probabilistic output, Quantitative risk assessment, Risk modeling, Security risk assessments, Software development projects, Threat modeling, Bayesian networks, Decision making, Risk assessment, Software design, Network security
Fields of Science
0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Citation
WoS Q
N/A
Scopus Q
N/A

OpenCitations Citation Count
18
Source
Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust
Volume
Issue
Start Page
952
End Page
960
PlumX Metrics
Citations
CrossRef : 8
Scopus : 29
Captures
Mendeley Readers : 37
SCOPUS™ Citations
29
checked on Mar 27, 2026
Google Scholar™


