Intelligent Risk Identification and Analysis in IT Network Systems

    Research output: A Conference proceeding or a Chapter in BookConference contribution

    4 Citations (Scopus)

    Abstract

    With ever increasing application of information technologies in every day activities, organizations face the need for applications that provides better security. The existence of complex IT systems with multiple interdependencies creates great difficulties for Chief Security Officers to comprehend and be aware of all potential risks in such systems. Intelligent decision making for IT security is a crucial element of an organization’s success and its competitive position in the marketplace. This paper considers the implementation of an integrated attack graph and a Fuzzy Cognitive Maps (FCM) to provide facilities to capture and represent complex relationships in IT systems. By using FCMs the security of IT systems can regularly be reviewed and improved. What-if analysis can be performed to better understand vulnerabilities of a designed system. Finally an integrated system consisting of FCM, Attack graphs and Genetic Algorithms (GA) is used to identify vulnerabilities of IT systems that may not be apparent to Chief Security Officers.
    Original languageEnglish
    Title of host publicationArtificial Intelligence Applications and Innovations - 12th INNS EANN - SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Confer
    Subtitle of host publicationIFIP Advances in Information and Communication Technology
    EditorsLazaros Iliadis, Ilias Maglogiannis, Harris Papadopoulos
    Place of PublicationBerlin, Heidelberg, Germany
    PublisherSpringer
    Pages370-377
    Number of pages8
    Volume364
    ISBN (Electronic)9783642239601
    ISBN (Print)9783642239595
    DOIs
    Publication statusPublished - 2011
    EventArtificial Intelligence Applications and Innovations: 12th INNS EANN - SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Confer - Corfu, Corfu, Greece
    Duration: 15 Sep 201118 Sep 2011

    Conference

    ConferenceArtificial Intelligence Applications and Innovations: 12th INNS EANN - SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Confer
    CountryGreece
    CityCorfu
    Period15/09/1118/09/11

    Fingerprint

    Information technology
    Genetic algorithms
    Decision making

    Cite this

    Mohammadian, M. (2011). Intelligent Risk Identification and Analysis in IT Network Systems. In L. Iliadis, I. Maglogiannis, & H. Papadopoulos (Eds.), Artificial Intelligence Applications and Innovations - 12th INNS EANN - SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Confer: IFIP Advances in Information and Communication Technology (Vol. 364, pp. 370-377). Berlin, Heidelberg, Germany: Springer. https://doi.org/10.1007/978-3-642-23960-1_44
    Mohammadian, Masoud. / Intelligent Risk Identification and Analysis in IT Network Systems. Artificial Intelligence Applications and Innovations - 12th INNS EANN - SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Confer: IFIP Advances in Information and Communication Technology. editor / Lazaros Iliadis ; Ilias Maglogiannis ; Harris Papadopoulos. Vol. 364 Berlin, Heidelberg, Germany : Springer, 2011. pp. 370-377
    @inproceedings{f0fda00f05c34bc0a8c398c4c74b467e,
    title = "Intelligent Risk Identification and Analysis in IT Network Systems",
    abstract = "With ever increasing application of information technologies in every day activities, organizations face the need for applications that provides better security. The existence of complex IT systems with multiple interdependencies creates great difficulties for Chief Security Officers to comprehend and be aware of all potential risks in such systems. Intelligent decision making for IT security is a crucial element of an organization’s success and its competitive position in the marketplace. This paper considers the implementation of an integrated attack graph and a Fuzzy Cognitive Maps (FCM) to provide facilities to capture and represent complex relationships in IT systems. By using FCMs the security of IT systems can regularly be reviewed and improved. What-if analysis can be performed to better understand vulnerabilities of a designed system. Finally an integrated system consisting of FCM, Attack graphs and Genetic Algorithms (GA) is used to identify vulnerabilities of IT systems that may not be apparent to Chief Security Officers.",
    keywords = "Intelligent Systems, Analysis, Decision Making",
    author = "Masoud Mohammadian",
    year = "2011",
    doi = "10.1007/978-3-642-23960-1_44",
    language = "English",
    isbn = "9783642239595",
    volume = "364",
    pages = "370--377",
    editor = "Lazaros Iliadis and Ilias Maglogiannis and Harris Papadopoulos",
    booktitle = "Artificial Intelligence Applications and Innovations - 12th INNS EANN - SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Confer",
    publisher = "Springer",
    address = "Netherlands",

    }

    Mohammadian, M 2011, Intelligent Risk Identification and Analysis in IT Network Systems. in L Iliadis, I Maglogiannis & H Papadopoulos (eds), Artificial Intelligence Applications and Innovations - 12th INNS EANN - SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Confer: IFIP Advances in Information and Communication Technology. vol. 364, Springer, Berlin, Heidelberg, Germany, pp. 370-377, Artificial Intelligence Applications and Innovations: 12th INNS EANN - SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Confer, Corfu, Greece, 15/09/11. https://doi.org/10.1007/978-3-642-23960-1_44

    Intelligent Risk Identification and Analysis in IT Network Systems. / Mohammadian, Masoud.

    Artificial Intelligence Applications and Innovations - 12th INNS EANN - SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Confer: IFIP Advances in Information and Communication Technology. ed. / Lazaros Iliadis; Ilias Maglogiannis; Harris Papadopoulos. Vol. 364 Berlin, Heidelberg, Germany : Springer, 2011. p. 370-377.

    Research output: A Conference proceeding or a Chapter in BookConference contribution

    TY - GEN

    T1 - Intelligent Risk Identification and Analysis in IT Network Systems

    AU - Mohammadian, Masoud

    PY - 2011

    Y1 - 2011

    N2 - With ever increasing application of information technologies in every day activities, organizations face the need for applications that provides better security. The existence of complex IT systems with multiple interdependencies creates great difficulties for Chief Security Officers to comprehend and be aware of all potential risks in such systems. Intelligent decision making for IT security is a crucial element of an organization’s success and its competitive position in the marketplace. This paper considers the implementation of an integrated attack graph and a Fuzzy Cognitive Maps (FCM) to provide facilities to capture and represent complex relationships in IT systems. By using FCMs the security of IT systems can regularly be reviewed and improved. What-if analysis can be performed to better understand vulnerabilities of a designed system. Finally an integrated system consisting of FCM, Attack graphs and Genetic Algorithms (GA) is used to identify vulnerabilities of IT systems that may not be apparent to Chief Security Officers.

    AB - With ever increasing application of information technologies in every day activities, organizations face the need for applications that provides better security. The existence of complex IT systems with multiple interdependencies creates great difficulties for Chief Security Officers to comprehend and be aware of all potential risks in such systems. Intelligent decision making for IT security is a crucial element of an organization’s success and its competitive position in the marketplace. This paper considers the implementation of an integrated attack graph and a Fuzzy Cognitive Maps (FCM) to provide facilities to capture and represent complex relationships in IT systems. By using FCMs the security of IT systems can regularly be reviewed and improved. What-if analysis can be performed to better understand vulnerabilities of a designed system. Finally an integrated system consisting of FCM, Attack graphs and Genetic Algorithms (GA) is used to identify vulnerabilities of IT systems that may not be apparent to Chief Security Officers.

    KW - Intelligent Systems

    KW - Analysis

    KW - Decision Making

    U2 - 10.1007/978-3-642-23960-1_44

    DO - 10.1007/978-3-642-23960-1_44

    M3 - Conference contribution

    SN - 9783642239595

    VL - 364

    SP - 370

    EP - 377

    BT - Artificial Intelligence Applications and Innovations - 12th INNS EANN - SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Confer

    A2 - Iliadis, Lazaros

    A2 - Maglogiannis, Ilias

    A2 - Papadopoulos, Harris

    PB - Springer

    CY - Berlin, Heidelberg, Germany

    ER -

    Mohammadian M. Intelligent Risk Identification and Analysis in IT Network Systems. In Iliadis L, Maglogiannis I, Papadopoulos H, editors, Artificial Intelligence Applications and Innovations - 12th INNS EANN - SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Confer: IFIP Advances in Information and Communication Technology. Vol. 364. Berlin, Heidelberg, Germany: Springer. 2011. p. 370-377 https://doi.org/10.1007/978-3-642-23960-1_44