Modeling and simulation for security risk propagation in critical information systems

Young Gab Kim, Dongwon Jeong, Soo Hyun Park, Jong In Lim, Doo Kwon Baik

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Existing risk propagation models are limited and inadequate for the analysis of cyber attacks caused by various threats to information systems, because of their limited focus only on one specific threat, such as a single virus or worm. Therefore, we herein propose a risk propagation model based on the Markov process, which can be applied to diverse threats to information systems. Furthermore, simulations including in case a threat occurs related with other threats are performed using five scenarios to verify the proposed model.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages858-868
Number of pages11
Volume4456 LNAI
Publication statusPublished - 2007 Dec 1
EventInternational Conference on Computational Intelligence and Security, CIS 2006 - Guangzhou, China
Duration: 2006 Nov 32006 Nov 6

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4456 LNAI
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherInternational Conference on Computational Intelligence and Security, CIS 2006
CountryChina
CityGuangzhou
Period06/11/306/11/6

Fingerprint

Information Systems
Modeling and Simulation
Information systems
Propagation
Markov Chains
Worm
Markov Process
Virus
Attack
Model-based
Verify
Viruses
Scenarios
Markov processes
Model
Simulation

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Kim, Y. G., Jeong, D., Park, S. H., Lim, J. I., & Baik, D. K. (2007). Modeling and simulation for security risk propagation in critical information systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4456 LNAI, pp. 858-868). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4456 LNAI).

Modeling and simulation for security risk propagation in critical information systems. / Kim, Young Gab; Jeong, Dongwon; Park, Soo Hyun; Lim, Jong In; Baik, Doo Kwon.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4456 LNAI 2007. p. 858-868 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4456 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, YG, Jeong, D, Park, SH, Lim, JI & Baik, DK 2007, Modeling and simulation for security risk propagation in critical information systems. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 4456 LNAI, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4456 LNAI, pp. 858-868, International Conference on Computational Intelligence and Security, CIS 2006, Guangzhou, China, 06/11/3.
Kim YG, Jeong D, Park SH, Lim JI, Baik DK. Modeling and simulation for security risk propagation in critical information systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4456 LNAI. 2007. p. 858-868. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Kim, Young Gab ; Jeong, Dongwon ; Park, Soo Hyun ; Lim, Jong In ; Baik, Doo Kwon. / Modeling and simulation for security risk propagation in critical information systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4456 LNAI 2007. pp. 858-868 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{b47052aa4246458e8ac57203253d5215,
title = "Modeling and simulation for security risk propagation in critical information systems",
abstract = "Existing risk propagation models are limited and inadequate for the analysis of cyber attacks caused by various threats to information systems, because of their limited focus only on one specific threat, such as a single virus or worm. Therefore, we herein propose a risk propagation model based on the Markov process, which can be applied to diverse threats to information systems. Furthermore, simulations including in case a threat occurs related with other threats are performed using five scenarios to verify the proposed model.",
author = "Kim, {Young Gab} and Dongwon Jeong and Park, {Soo Hyun} and Lim, {Jong In} and Baik, {Doo Kwon}",
year = "2007",
month = "12",
day = "1",
language = "English",
isbn = "9783540743767",
volume = "4456 LNAI",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "858--868",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Modeling and simulation for security risk propagation in critical information systems

AU - Kim, Young Gab

AU - Jeong, Dongwon

AU - Park, Soo Hyun

AU - Lim, Jong In

AU - Baik, Doo Kwon

PY - 2007/12/1

Y1 - 2007/12/1

N2 - Existing risk propagation models are limited and inadequate for the analysis of cyber attacks caused by various threats to information systems, because of their limited focus only on one specific threat, such as a single virus or worm. Therefore, we herein propose a risk propagation model based on the Markov process, which can be applied to diverse threats to information systems. Furthermore, simulations including in case a threat occurs related with other threats are performed using five scenarios to verify the proposed model.

AB - Existing risk propagation models are limited and inadequate for the analysis of cyber attacks caused by various threats to information systems, because of their limited focus only on one specific threat, such as a single virus or worm. Therefore, we herein propose a risk propagation model based on the Markov process, which can be applied to diverse threats to information systems. Furthermore, simulations including in case a threat occurs related with other threats are performed using five scenarios to verify the proposed model.

UR - http://www.scopus.com/inward/record.url?scp=38349011910&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=38349011910&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:38349011910

SN - 9783540743767

VL - 4456 LNAI

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 858

EP - 868

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -