Security risk assessment based on intelligent systems and attack graphs

Masoud MOHAMMADIAN, Dimitrios Hatzinakos

Research output: A Conference proceeding or a Chapter in BookChapterpeer-review

Abstract

Visualization and graphical representation of a system can improve the understanding of the designer of a system and mitigate risks of attack to designed systems. An attack graphs documents the risks known at the time the system is designed. Attack graphs use graphical representation which assists in documenting security risks and identifying possible paths attackers may consider for attacking a system for their undesirable goal. However an attack graph does not provide facilities to perform concrete risk analysis such as what-if and scenarios analysis to test the designed system for possible risk of attacks. In this article, a fuzzy cognitive map (FCM) is used with graph attacks to provide facilities that will enable the system architects to perform what-if analysis to better understand vulnerabilities of their designed system.
Original languageEnglish
Title of host publicationSmartData: Privacy Meets Evolutionary Robotics
EditorsInman Harvey, Ann Cavoukian, George Tomko, Don Borrett, Hon Kwan, Dimitrios Hatzinakos
Place of PublicationUnited States
PublisherSpringer
Pages149-160
Number of pages12
Edition1
ISBN (Electronic)9781461464099
ISBN (Print)9781461464082
DOIs
Publication statusPublished - 2013

Fingerprint

Dive into the research topics of 'Security risk assessment based on intelligent systems and attack graphs'. Together they form a unique fingerprint.

Cite this