Skip to main content

Security Risks Assessment Based on Intelligent Systems and Attack Graphs

  • Conference paper
  • First Online:
SmartData

Abstract

Visualization and graphical representation of a system can improve the understanding of the designer of a system and mitigate risks of attack to designed systems. An attack graphs documents the risks known at the time the system is designed. Attack graphs use graphical representation which assists in documenting security risks and identifying possible paths attackers may consider for attacking a system for their undesirable goal. However an attack graph does not provide facilities to perform concrete risk analysis such as what-if and scenarios analysis to test the designed system for possible risk of attacks. In this article, a fuzzy cognitive map (FCM) is used with graph attacks to provide facilities that will enable the system architects to perform what-if analysis to better understand vulnerabilities of their designed system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gupta 1. S, Winstead, J (2007) Using Attack Graphs to Design Systems, IEEE Security and Privacy, IEEE Computer Society Publishing

    Google Scholar 

  2. Peterson G, Steven J (2006) Defining Misuse within the Development Process, IEEE Security & Privacy, vol. 4, no. 6, pp. 81–84

    Article  Google Scholar 

  3. Peeters J, Dyson P (2007) Cost- Effective Security, IEEE Security & Privacy, vol. 5, no. 3, pp. 85–87

    Article  Google Scholar 

  4. Ylönen T (1996) SSH: Secure Login Connections Over the Internet, Proceedings of 6th Usenix Security Symposium., Usenix Assoc., pp. 37–42

    Google Scholar 

  5. Diamah A, Mohammadian M. Balachandran B (2012) Network Security Evaluation Method via Attack Graphs and Fuzzy Cognitive Maps, 4th International Conference on Intelligent Decision Technologies, Japan

    Google Scholar 

  6. Kosko B (1997) Fuzzy Engineering, Prentice Hall, Upper Saddle River, USA

    MATH  Google Scholar 

  7. Kosko B (1986) Fuzzy Cognitive Maps, Int’l J. Man-Machine Studies, Vol. 24, pp. 65–75

    Article  MATH  Google Scholar 

  8. Aguilar J (2005) A Survey about Fuzzy Cognitive Maps Papers, International Journal of Computational Cognition, vol 3, no. 2, pp. 27–33

    Google Scholar 

  9. Georgopoulous V. C, Malandrak G. A, Stylios C. D (2002) A Fuzzy Cognitive Map Approach to Differential Diagnosis of Specific Language Impairment, Artificial Intelligence in Medicine, pp. 1–18

    Google Scholar 

  10. Papageorgiou E. I, Stylios C. D, Groumpos P. P (2003) An integrating two-level hierarchical system for decision making in radiation therapy using fuzzy cognitive maps, IEEE Transactions on Biomedical Engineering

    Google Scholar 

  11. Andreou A. S, Mateou N. H, Zombanakis G. A (2003) Evolutionary Fuzzy Cognitive Maps: A Hybrid System for Crisis Management and Political Decision Making, Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation (CIMCA2003), Vienna, Austria, pp. 732–743

    Google Scholar 

  12. Zadeh L. A (1965) Fuzzy sets", Information and control, Vol. 8. pp. 338–352

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Masoud Mohammadian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Mohammadian, M., Hatzinakos, D. (2013). Security Risks Assessment Based on Intelligent Systems and Attack Graphs. In: Harvey, I., Cavoukian, A., Tomko, G., Borrett, D., Kwan, H., Hatzinakos, D. (eds) SmartData. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6409-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-6409-9_14

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-6408-2

  • Online ISBN: 978-1-4614-6409-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics