Modeling and simulation for security risk propagation in critical information systems

Young Gab Kim, Dongwon Jeong, Soo Hyun Park, Jongin Lim, Doo Kwon Baik

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Existing risk propagation models are limited and inadequate for the analysis of cyber attacks caused by various threats to information systems, because of their limited focus only on one specific threat, such as a single virus or worm. Therefore, we herein propose a risk propagation model based on the Markov process, which can be applied to diverse threats to information systems. Furthermore, simulations including in case a threat occurs related with other threats are performed using five scenarios to verify the proposed model.

Original languageEnglish
Title of host publicationComputational Intelligence and Security - International Conference, CIS 2006, Revised Selected Papers
PublisherSpringer Verlag
Pages858-868
Number of pages11
ISBN (Print)9783540743767
DOIs
Publication statusPublished - 2007
EventInternational Conference on Computational Intelligence and Security, CIS 2006 - Guangzhou, China
Duration: 2006 Nov 32006 Nov 6

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4456 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherInternational Conference on Computational Intelligence and Security, CIS 2006
CountryChina
CityGuangzhou
Period06/11/306/11/6

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Modeling and simulation for security risk propagation in critical information systems'. Together they form a unique fingerprint.

  • Cite this

    Kim, Y. G., Jeong, D., Park, S. H., Lim, J., & Baik, D. K. (2007). Modeling and simulation for security risk propagation in critical information systems. In Computational Intelligence and Security - International Conference, CIS 2006, Revised Selected Papers (pp. 858-868). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4456 LNAI). Springer Verlag. https://doi.org/10.1007/978-3-540-74377-4_90