Abstract
Protected Core Networking (PCN) is an approach to creating a secure and flexible network and communications infrastructure that supports network enabled capability (NEC) operations. The real-time automated risk assessment (R-TARA) provides a theoretically and practically sound method for risk assessment in the Protected Core. The purpose of the R-TARA is multifold. On the one hand it provides a global metric, which could be used by the network operator to assess the overall security level of the network and its evolution over time. On the other hand, the results of R-TARA can be used in order to achieve dynamic accreditation. Finally, R-TARA local risk metrics, e.g. susceptibility to DoS attacks, can be used for dynamic routing decisions. We propose use of Bayesian networks, known from operational risk assessment, for PCN risk assessment and we provide analytical and simulative evaluation of R-TARA mechanisms.
Similar content being viewed by others
References
Hallingstad, G., & Oudkerk, S. (2008). Protected core networking: an architectural approach to secure and flexible networking. IEEE Communications Magazine, 46(11).
Hallingstad, G., & Oudkerk, S. (2008). Selected aspects of protected core networking (Technical Note 1349). NC3A, March.
Hallingstad, G., & Oudkerk, S. (2007). Protected core networking—initial concept description (Technical Note 1241). NC3A, March.
Kuipers, F., Van Mieghem, P., Korkmaz, T., & Krunz, M. (2002). An overview of constraint-based path selection algorithms for QoS routing. IEEE Communications Magazine, 40(12), 50–55.
Cornalba, C., & Giudici, P. (2004). Statistical models for operational risk management. Physica A: Statistical Mechanics and its Applications, 338(1–2), 166–172.
Kuehn, R., & Neu, P. (2003). Functional correlation approach to operational risk in banking organizations. Physica A, 322, 650–666.
Anand, K., & Kuehn, R. (2007). Phase transitions in operational risk. Physical Review E, 75, 016111.
Leippold, M., & Vanini, P. (2005). The quantification of operational risk. Journal of Risk, 8(1).
MAGERIT—version 2: methodology for information systems risk analysis and management, Part III—Techniques. Ministerio de Administraciones Públicas, Madrid, 20 June 2006 (v 1.1), NIPO: 326-06-044-8.
Kjærulff, U., & Madsen, A. (2008). Bayesian networks and influence diagrams—a guide to construction and analysis. Berlin: Springer.
Koiter, J. R. (2006). Visualizing inference in Bayesian networks. Master Thesis, Delft University of Technology, The Netherlands.
GeNIe 2.0 Manual. Decision Systems Laboratory, University of Pittsburgh, 2008.
Cooper, G. (1990). The computational complexity of probabilistic inference using Bayesian belief networks. Artificial Intelligence, 42(2–3), 393–405.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wrona, K., Hallingstad, G. Real-time automated risk assessment in protected core networking. Telecommun Syst 45, 205–214 (2010). https://doi.org/10.1007/s11235-009-9242-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-009-9242-1