Zur Hauptnavigation wechseln Zur Suche wechseln Zum Hauptinhalt wechseln

Risk Propagation Analysis and Visualization using Percolation Theory

    Publikation: Beitrag in FachzeitschriftArtikelBegutachtung

    Abstract

    This article presents a percolation-based approach for the analysis of risk propagation, using malware spreading as a showcase example. Conventional risk management is often driven by human (subjective) assessment of how one risk influences the other, respectively, how security incidents can affect subsequent problems in interconnected (sub)systems of an infrastructure. Using percolation theory, a well-established methodology in the fields of epidemiology and disease spreading, a simple simulation-based method is described to assess risk propagation system-atically. This simulation is formally analyzed using percolation theory, to obtain closed form criteria that help predicting a pandemic incident propagation (or a propagation with average-case bounded implications). The method is designed as a security decision support tool, e.g., to be used in security operation centers. For that matter, a flexible visualization technique is devised, which is naturally induced by the percolation model and the simulation algorithm that derives from it. The main output of the model is a graphical visualization of the infrastructure (physical or logical topology). This representation uses color codes to indicate the likelihood of problems to arise from a security incident that initially occurs at a given point in the system. Large likelihoods for problems thus indicate “hotspots”, where additional action should be taken.
    OriginalspracheEnglisch
    Seiten (von - bis)694-701
    Seitenumfang8
    FachzeitschriftInternational Journal of Advanced Computer Science and Applications
    Volume7
    Issue1
    DOIs
    PublikationsstatusVeröffentlicht - 2016

    Research Field

    • Ehemaliges Research Field - Digital Safety and Security

    Fingerprint

    Untersuchen Sie die Forschungsthemen von „Risk Propagation Analysis and Visualization using Percolation Theory“. Zusammen bilden sie einen einzigartigen Fingerprint.

    Diese Publikation zitieren