2012 International Conference on High Performance Computing &Amp; Simulation (HPCS) 2012
DOI: 10.1109/hpcsim.2012.6266959
|View full text |Cite
|
Sign up to set email alerts
|

A multi-objective genetic algorithm for minimising network security risk and cost

Abstract: Abstract-Security countermeasures help ensure information security: confidentiality, integrity and availability(CIA), by mitigating possible risks associated with the security event. Due to the fact, that it is often difficult to measure such an impact quantitatively, it is also difficult to deploy appropriate security countermeasures. In this paper, we demonstrate a model of quantitative risk analysis, where an optimisation routine is developed to help a human decision maker to determine the preferred trade-o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…As can be seen from Table 2, the maximum relative error between the output of the network and the expected output value is 5.17%, and the minimum relative error is 1.38%. Under the same settings, compared with the literature [7], the literature [8] and the literature [9], the average error of the method is also the smallest (see Fig. 6).…”
Section: Experiments and Analysismentioning
confidence: 86%
See 1 more Smart Citation
“…As can be seen from Table 2, the maximum relative error between the output of the network and the expected output value is 5.17%, and the minimum relative error is 1.38%. Under the same settings, compared with the literature [7], the literature [8] and the literature [9], the average error of the method is also the smallest (see Fig. 6).…”
Section: Experiments and Analysismentioning
confidence: 86%
“…The ambiguity of expression and the heterogeneity of the plan system, etc., cannot be organically unified between different emergency plan systems [6]. The literature [7] proposed a multi-objective genetic algorithm (MOGA) method, offline optimization routines to deploy genetic algorithms to search for the best combination of strategies, while considering multiple risk factors, from the PTA (practical threat analysis) case study The real world data was tested to show that our approach can provide solutions for real-world problem data sets. Literature [8] proposed an information system security risk assessment method, which is applied to group decision and analytic process methods.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, a genetic algorithm was adopted to choose the minimal-cost security profile providing the maximal vulnerability coverage. Ref [17] demonstrated a model of quantitative risk analysis, and deplyed a genetic algorithm to search for the best countermeasure combination, while multiple risk factors are considered. Apart from genetic algorithm, efforts have been spent to seek for more possibilities of solving the problem.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, it's convenient for the optimal set to cooperate with different security goals and hardening constraints, because defenders can choose specific solutions flexibly from the optimal set to address practical security problems. Compare with previous works which also adopt genetic algorithms to work out the problem, such as [8] [17] and [20], our method have three major differences. First, our multi-objective model is constructed on the basis of simplified risk flow attack graph rather than complex attack trees or attack graphs.…”
Section: Related Workmentioning
confidence: 99%
“…The method is based on an application of Genetic Algorithms (GA) to the FFIP framework. In the previous applications of GA to security, computing and physical properties of the system under attack were not explicitly modelled and simulated, since expert judgment has been used to provide data for the algorithm to operate on instead of simulation [25] while [26] requires historical data or other knowledge sources about system vulnerabilities as input. In this paper, only a simulation model of the system is required, and the method is demonstrated with a detailed simulation of a generic pressurized nuclear water reactor model.…”
Section: System Simulation For Security Impact Assessmentmentioning
confidence: 99%