Risk Propagation Analysis and Visualization using Percolation Theory

Sandra König, Stefan Rass, Stefan Schauer, Alexander Beck

Publikation: Beitrag in FachzeitschriftArtikelBegutachtung

Abstract

This article presents a percolation-based approach for the analysis of risk propagation, using malware spreading as a showcase example. Conventional risk management is often driven by human (subjective) assessment of how one risk influences the other, respectively, how security incidents can affect subsequent problems in interconnected (sub)systems of an infrastructure. Using percolation theory, a well-established methodology in the fields of epidemiology and disease spreading, a simple simulation-based method is described to assess risk propagation system-atically. This simulation is formally analyzed using percolation theory, to obtain closed form criteria that help predicting a pandemic incident propagation (or a propagation with average-case bounded implications). The method is designed as a security decision support tool, e.g., to be used in security operation centers. For that matter, a flexible visualization technique is devised, which is naturally induced by the percolation model and the simulation algorithm that derives from it. The main output of the model is a graphical visualization of the infrastructure (physical or logical topology). This representation uses color codes to indicate the likelihood of problems to arise from a security incident that initially occurs at a given point in the system. Large likelihoods for problems thus indicate “hotspots”, where additional action should be taken.
OriginalspracheEnglisch
Seiten (von - bis)694-701
Seitenumfang8
FachzeitschriftInternational Journal of Advanced Computer Science and Applications
Volume7
Issue1
DOIs
PublikationsstatusVeröffentlicht - 2016

Research Field

  • Ehemaliges Research Field - Digital Safety and Security

Fingerprint

Untersuchen Sie die Forschungsthemen von „Risk Propagation Analysis and Visualization using Percolation Theory“. Zusammen bilden sie einen einzigartigen Fingerprint.

Diese Publikation zitieren