Skip to main content

Advertisement

Log in

Real-time automated risk assessment in protected core networking

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Protected Core Networking (PCN) is an approach to creating a secure and flexible network and communications infrastructure that supports network enabled capability (NEC) operations. The real-time automated risk assessment (R-TARA) provides a theoretically and practically sound method for risk assessment in the Protected Core. The purpose of the R-TARA is multifold. On the one hand it provides a global metric, which could be used by the network operator to assess the overall security level of the network and its evolution over time. On the other hand, the results of R-TARA can be used in order to achieve dynamic accreditation. Finally, R-TARA local risk metrics, e.g. susceptibility to DoS attacks, can be used for dynamic routing decisions. We propose use of Bayesian networks, known from operational risk assessment, for PCN risk assessment and we provide analytical and simulative evaluation of R-TARA mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Hallingstad, G., & Oudkerk, S. (2008). Protected core networking: an architectural approach to secure and flexible networking. IEEE Communications Magazine, 46(11).

  2. Hallingstad, G., & Oudkerk, S. (2008). Selected aspects of protected core networking (Technical Note 1349). NC3A, March.

  3. Hallingstad, G., & Oudkerk, S. (2007). Protected core networking—initial concept description (Technical Note 1241). NC3A, March.

  4. Kuipers, F., Van Mieghem, P., Korkmaz, T., & Krunz, M. (2002). An overview of constraint-based path selection algorithms for QoS routing. IEEE Communications Magazine, 40(12), 50–55.

    Article  Google Scholar 

  5. Cornalba, C., & Giudici, P. (2004). Statistical models for operational risk management. Physica A: Statistical Mechanics and its Applications, 338(1–2), 166–172.

    Article  Google Scholar 

  6. Kuehn, R., & Neu, P. (2003). Functional correlation approach to operational risk in banking organizations. Physica A, 322, 650–666.

    Article  Google Scholar 

  7. Anand, K., & Kuehn, R. (2007). Phase transitions in operational risk. Physical Review E, 75, 016111.

    Article  Google Scholar 

  8. Leippold, M., & Vanini, P. (2005). The quantification of operational risk. Journal of Risk, 8(1).

  9. MAGERIT—version 2: methodology for information systems risk analysis and management, Part III—Techniques. Ministerio de Administraciones Públicas, Madrid, 20 June 2006 (v 1.1), NIPO: 326-06-044-8.

  10. Kjærulff, U., & Madsen, A. (2008). Bayesian networks and influence diagrams—a guide to construction and analysis. Berlin: Springer.

    Book  Google Scholar 

  11. Koiter, J. R. (2006). Visualizing inference in Bayesian networks. Master Thesis, Delft University of Technology, The Netherlands.

  12. GeNIe 2.0 Manual. Decision Systems Laboratory, University of Pittsburgh, 2008.

  13. Cooper, G. (1990). The computational complexity of probabilistic inference using Bayesian belief networks. Artificial Intelligence, 42(2–3), 393–405.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Konrad Wrona.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wrona, K., Hallingstad, G. Real-time automated risk assessment in protected core networking. Telecommun Syst 45, 205–214 (2010). https://doi.org/10.1007/s11235-009-9242-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-009-9242-1

Keywords

Navigation