2010 IEEE/IFIP International Conference on Dependable Systems &Amp; Networks (DSN) 2010
DOI: 10.1109/dsn.2010.5544924
|View full text |Cite
|
Sign up to set email alerts
|

Using Bayesian networks for cyber security analysis

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 84 publications
(27 citation statements)
references
References 21 publications
0
21
0
Order By: Relevance
“…Researchers have used Bayesian network models in intrusion detection systems. Those models have the flexibility to be combined with other techniques, yet authors in Xie et al (2010) warn that the combination should be done with preserving Bayesian networks strength to identify and represent relevant uncertainties. Many of the behavioral theories can be tested by simulation.…”
Section: Modeling and Simulationmentioning
confidence: 99%
“…Researchers have used Bayesian network models in intrusion detection systems. Those models have the flexibility to be combined with other techniques, yet authors in Xie et al (2010) warn that the combination should be done with preserving Bayesian networks strength to identify and represent relevant uncertainties. Many of the behavioral theories can be tested by simulation.…”
Section: Modeling and Simulationmentioning
confidence: 99%
“…In recent years, research has been conducted on the dynamics and implementation of cyber attacks to better analyze the impact of those attackers. Studies have been conducted on the use of network vulnerabilities to identify possible and realistic ways to attack [1][2][3][4][5][6]. Thus, [1] provides specific examples of large-scale cyber attacks.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…t |Pa(Z i t )) for all t > 1. In literature [45], Bayesian network is used to capture the uncertainty in attack structures, attacker actions and alerts. To capture the uncertainty in attack structure, CVSS metrics such as Access Complexity (AC) and Exploitability (E) are used to derive the CPT parameters.…”
Section: The Nodes In the First Slice Of A 2tbn Do Not Have Any Parammentioning
confidence: 99%
“…In literature [45], zero-day vulnerability is first mentioned in the domain of using Bayesian network for network security analysis, but the technology of unknown vulnerability risk assessment is not given.…”
Section: ) Applying Bn To Uvramentioning
confidence: 99%