2016
DOI: 10.1007/978-3-319-44524-3_2
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Risk Assessment Model Based on Bayesian Networks

Abstract: Abstract. Because of the threat posed by advanced multi-step attacks, it is difficult for security operators to fully cover all vulnerabilities when deploying countermeasures. Deploying sensors to monitor attacks exploiting residual vulnerabilities is not sufficient and new tools are needed to assess the risk associated with the security events produced by these sensors. Although attack graphs were proposed to represent known multistep attacks occurring in an information system, they are not directly suited fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 14 publications
(22 reference statements)
0
3
0
Order By: Relevance
“…Another strategy relies on Bayesian-based reasoning, in which graph edges and vertices are assigned probabilities based on their likelihood of being affected by the exploitation of underlying vulnerabilities. However, the nature of adversaries is driven by the achievement of detrimental goals against the system rather than probabilities or topological weights [3].…”
Section: Related Work a Vulnerability Quantificationmentioning
confidence: 99%
“…Another strategy relies on Bayesian-based reasoning, in which graph edges and vertices are assigned probabilities based on their likelihood of being affected by the exploitation of underlying vulnerabilities. However, the nature of adversaries is driven by the achievement of detrimental goals against the system rather than probabilities or topological weights [3].…”
Section: Related Work a Vulnerability Quantificationmentioning
confidence: 99%
“…Shin et al 29 developed a risk model to represent the probability of cyber attacks and how an organization complies with security policies. Augessy et al 30 proposed an approach to model ongoing and possible future attacks. Khosravi-Farhad et al 31,32 proposed the use of the Bayesian decision networks to measure the impact of vulnerabilities and to find minimum-cost security measures.…”
Section: Attack Graphs and Bayesian Network In Cybersecuritymentioning
confidence: 99%
“…Similarly, probabilistic models using Bayesian networks can also represent attack graphs via directed acyclic graphs. Nodes represent random variables and edges represent probabilistic dependencies between variables [3]. An example is BAM (Bayesian Attack Model) [4], which builds upon Bayesian attack trees.…”
Section: Literature On Attack Graphsmentioning
confidence: 99%