{"title":"A Weighting Model of Cybersecurity Parameters Used for Service Placement","authors":"Luan Gashi, A. Luma, M. Apostolova, Ylber Januzaj","doi":"10.3991/ijoe.v19i07.39285","DOIUrl":null,"url":null,"abstract":"Most cybersecurity frameworks are based on three major components such as confidentiality, integrity, and availability. All these components have their parameters that are used to secure network nodes. But finding the most cyber secure node in a network needs a measurement method. The aim of the paper is to offer a model that can be used to find the most secure network nodes considering these cybersecurity components and their parameters. This is achieved by modelling numeric values of respective weights for parameters of confidentiality, integrity, and availability. The model is applied to a simulated environment where random values standing for cybersecurity parameters are given to 30 wireless network nodes that are used as an example. Then the weighted values are processed with Python programming language by giving the most secure nodes according to needed cybersecurity components. This model can be used to recommend the right network node that can be used to deploy services securely while avoiding potential vulnerabilities and cyber-attacks. \n ","PeriodicalId":36900,"journal":{"name":"International Journal of Online and Biomedical Engineering","volume":null,"pages":null},"PeriodicalIF":1.7000,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Online and Biomedical Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3991/ijoe.v19i07.39285","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 1
Abstract
Most cybersecurity frameworks are based on three major components such as confidentiality, integrity, and availability. All these components have their parameters that are used to secure network nodes. But finding the most cyber secure node in a network needs a measurement method. The aim of the paper is to offer a model that can be used to find the most secure network nodes considering these cybersecurity components and their parameters. This is achieved by modelling numeric values of respective weights for parameters of confidentiality, integrity, and availability. The model is applied to a simulated environment where random values standing for cybersecurity parameters are given to 30 wireless network nodes that are used as an example. Then the weighted values are processed with Python programming language by giving the most secure nodes according to needed cybersecurity components. This model can be used to recommend the right network node that can be used to deploy services securely while avoiding potential vulnerabilities and cyber-attacks.