A threat risk estimation model for computer network security

Razieh Rezaee, A. G. Bafghi, Masoud Khosravi-Farmad
{"title":"A threat risk estimation model for computer network security","authors":"Razieh Rezaee, A. G. Bafghi, Masoud Khosravi-Farmad","doi":"10.1109/ICCKE.2016.7802144","DOIUrl":null,"url":null,"abstract":"Risk analysis of security threats in computer networks is one of the most challenging fields in network management. Security risk analysis is usually done by security experts. Although they utilize analysis tools such as scanners and analyzers, the need for expert is still inevitable. To reduce the need of security expertise for network administrator, yet performing security risk management, this paper proposes UML models to represent expert's security information. We propose a UML class diagram which is built up of necessary classes for security analysis of networks. These classes are the building blocks needed for estimation of probability and effects of security threats. This model is created once and represents the security information needed for analysis. To analyze any network, the needed objects should be instantiated from the provided classes. These objects form the security model of the network with all the threats and their risks specified in. To instantiate the objects of network security model, its information is needed. This information is usually available in documents of a network or is obtainable via automated scanners. We show the applicability of the proposed model on a test network. As the result, the security model of the network which contains its security threats and also their risks are obtained.","PeriodicalId":205768,"journal":{"name":"2016 6th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 6th International Conference on Computer and Knowledge Engineering (ICCKE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCKE.2016.7802144","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Risk analysis of security threats in computer networks is one of the most challenging fields in network management. Security risk analysis is usually done by security experts. Although they utilize analysis tools such as scanners and analyzers, the need for expert is still inevitable. To reduce the need of security expertise for network administrator, yet performing security risk management, this paper proposes UML models to represent expert's security information. We propose a UML class diagram which is built up of necessary classes for security analysis of networks. These classes are the building blocks needed for estimation of probability and effects of security threats. This model is created once and represents the security information needed for analysis. To analyze any network, the needed objects should be instantiated from the provided classes. These objects form the security model of the network with all the threats and their risks specified in. To instantiate the objects of network security model, its information is needed. This information is usually available in documents of a network or is obtainable via automated scanners. We show the applicability of the proposed model on a test network. As the result, the security model of the network which contains its security threats and also their risks are obtained.
计算机网络安全威胁风险评估模型
计算机网络安全威胁的风险分析是网络管理中最具挑战性的领域之一。安全风险分析通常由安全专家完成。虽然他们使用诸如扫描仪和分析仪等分析工具,但对专家的需求仍然是不可避免的。为了减少网络管理员对安全专业知识的需求,同时进行安全风险管理,本文提出了UML模型来表示专家的安全信息。我们提出了一个UML类图,它由网络安全分析所需要的类组成。这些类是评估安全威胁的概率和影响所需的构建块。此模型只创建一次,并表示分析所需的安全信息。要分析任何网络,需要的对象应该从提供的类中实例化。这些对象构成了网络的安全模型,其中包含了所有的威胁及其风险。为了实例化网络安全模型的对象,需要它的信息。这些信息通常可以在网络文档中获得,或者通过自动扫描器获得。我们在一个测试网络上证明了该模型的适用性。从而得到包含网络安全威胁及其风险的网络安全模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信