Network Security Risk Assessment Using Bayesian Belief Networks

Loading...
Publication Logo

Date

2010

Authors

Kondakçı, Süleyman

Journal Title

Journal ISSN

Volume Title

Publisher

Open Access Color

Green Open Access

No

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Average
Influence
Top 10%
Popularity
Average

Research Projects

Journal Issue

Abstract

This paper presents a causal assessment model based on Bayesian Belief Networks to analyze and quantify information security risks caused by various threat sources. The proposed model can be applied to a variety of information security evaluation tasks, risk assessment, software development projects, IT products, and other decision making systems. This unique concept can also be used for the determination of joint risk propagation and interdependence structures within computer networks, information systems, and other engineering tasks in general. By this manner, we can facilitate the determination of probabilistic outputs caused by some precalculated input probabilities or by marginal/joint probabilities found so far within the chain of an interdependence structure. © 2010 IEEE.

Description

IEEE Computer Society
2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010 -- 20 August 2010 through 22 August 2010 -- Minneapolis, MN -- 82366

Keywords

Information security, Quantitative risk assessment, Risk modeling, Threat modeling, Assessment models, Bayesian Belief Networks, Decision-making systems, Engineering tasks, Information security, IT products, Probabilistic output, Quantitative risk assessment, Risk modeling, Security risk assessments, Software development projects, Threat modeling, Bayesian networks, Decision making, Risk assessment, Software design, Network security

Fields of Science

0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology

Citation

WoS Q

N/A

Scopus Q

N/A
OpenCitations Logo
OpenCitations Citation Count
18

Source

Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust

Volume

Issue

Start Page

952

End Page

960
PlumX Metrics
Citations

CrossRef : 8

Scopus : 29

Captures

Mendeley Readers : 37

SCOPUS™ Citations

29

checked on Mar 27, 2026

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
4.8559

Sustainable Development Goals