Dynamic Security Risk Management Using Bayesian Attack Graphs
#1

Abstract—Security risk assessment and mitigation are two vital processes that need to be executed to maintain a productive IT infrastructure. On one hand, models such as attack graphs and attack trees have been proposed to assess the cause-consequence relationships between various network states, while on the other hand, different decision problems have been explored to identify the minimum-cost hardening measures. However, these risk models do not help reason about the causal dependencies between network states. Further, the optimization formulations ignore the issue of resource availability while analyzing a risk model. In this paper, we propose a risk management framework using Bayesian networks that enable a system administrator to quantify the chances of network compromise at various levels. We show how to use this information to develop a security mitigation and management plan. In contrast to other similar models, this risk model lends itself to dynamic analysis during the deployed phase of the network. A multiobjective optimization platform provides the administrator with all trade-off information required to make decisions in a resource constrained environment.



projects9.com
Contact us : projects[at]projects9.com
Call us :8008855666
Reply
#2


to get information about the topic risk management full report,ppt, related topic refer the page link bellow

http://studentbank.in/report-principles-...management

http://studentbank.in/report-industrial-...management

http://studentbank.in/report-insurance-a...management

http://studentbank.in/report-insurance-a...management

http://studentbank.in/report-risk-manage...ing-sector

http://studentbank.in/report-dynamic-sec...ack-graphs

http://seminarsprojects.in/attachment.php?aid=6155
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: epa risk management program, construction risk management plan, information security risk assessment, bayesian algorithm for dynamic security ri, risk management business, bayesian attack graphs definition, risk management in outdoor,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cloud Computing Security: From Single to Multi-Clouds 1 818 14-02-2017, 04:56 PM
Last Post: jaseela123d
  A New Cell-Counting-Based Attack against Tor 1 704 14-02-2017, 11:26 AM
Last Post: ijasti
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER-TO-PEER NETWORKS--PARALLEL AND DISTRIBU electronics seminars 9 7,327 14-07-2015, 02:25 PM
Last Post: seminar report asees
  Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks Projects9 2 1,301 14-07-2015, 02:11 PM
Last Post: seminar report asees
  Security system using IP camera mechanical engineering crazy 5 4,324 16-03-2015, 02:52 PM
Last Post: seminar report asees
  Blood Bank Management System Using Unified Process Methodology seminar class 3 9,648 24-02-2015, 01:49 PM
Last Post: Guest
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,241 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,682 11-09-2014, 07:45 PM
Last Post: erhhk
  Folder Security System computer science topics 6 3,652 29-07-2013, 11:09 AM
Last Post: computer topic

Forum Jump: