Abstract
Visualization and graphical representation of a system can improve the understanding of the designer of a system and mitigate risks of attack to designed systems. An attack graphs documents the risks known at the time the system is designed. Attack graphs use graphical representation which assists in documenting security risks and identifying possible paths attackers may consider for attacking a system for their undesirable goal. However an attack graph does not provide facilities to perform concrete risk analysis such as what-if and scenarios analysis to test the designed system for possible risk of attacks. In this article, a fuzzy cognitive map (FCM) is used with graph attacks to provide facilities that will enable the system architects to perform what-if analysis to better understand vulnerabilities of their designed system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gupta 1. S, Winstead, J (2007) Using Attack Graphs to Design Systems, IEEE Security and Privacy, IEEE Computer Society Publishing
Peterson G, Steven J (2006) Defining Misuse within the Development Process, IEEE Security & Privacy, vol. 4, no. 6, pp. 81–84
Peeters J, Dyson P (2007) Cost- Effective Security, IEEE Security & Privacy, vol. 5, no. 3, pp. 85–87
Ylönen T (1996) SSH: Secure Login Connections Over the Internet, Proceedings of 6th Usenix Security Symposium., Usenix Assoc., pp. 37–42
Diamah A, Mohammadian M. Balachandran B (2012) Network Security Evaluation Method via Attack Graphs and Fuzzy Cognitive Maps, 4th International Conference on Intelligent Decision Technologies, Japan
Kosko B (1997) Fuzzy Engineering, Prentice Hall, Upper Saddle River, USA
Kosko B (1986) Fuzzy Cognitive Maps, Int’l J. Man-Machine Studies, Vol. 24, pp. 65–75
Aguilar J (2005) A Survey about Fuzzy Cognitive Maps Papers, International Journal of Computational Cognition, vol 3, no. 2, pp. 27–33
Georgopoulous V. C, Malandrak G. A, Stylios C. D (2002) A Fuzzy Cognitive Map Approach to Differential Diagnosis of Specific Language Impairment, Artificial Intelligence in Medicine, pp. 1–18
Papageorgiou E. I, Stylios C. D, Groumpos P. P (2003) An integrating two-level hierarchical system for decision making in radiation therapy using fuzzy cognitive maps, IEEE Transactions on Biomedical Engineering
Andreou A. S, Mateou N. H, Zombanakis G. A (2003) Evolutionary Fuzzy Cognitive Maps: A Hybrid System for Crisis Management and Political Decision Making, Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation (CIMCA2003), Vienna, Austria, pp. 732–743
Zadeh L. A (1965) Fuzzy sets", Information and control, Vol. 8. pp. 338–352
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Mohammadian, M., Hatzinakos, D. (2013). Security Risks Assessment Based on Intelligent Systems and Attack Graphs. In: Harvey, I., Cavoukian, A., Tomko, G., Borrett, D., Kwan, H., Hatzinakos, D. (eds) SmartData. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6409-9_14
Download citation
DOI: https://doi.org/10.1007/978-1-4614-6409-9_14
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-6408-2
Online ISBN: 978-1-4614-6409-9
eBook Packages: Computer ScienceComputer Science (R0)