Trust-Based Security Level Evaluation Using Bayesian Belief Networks
Security is not merely about technical solutions and patching vulnerabilities. Security is about trade-offs and adhering to realistic security needs, employed to support core business processes. Also, modern systems are subject to a highly competitive market, often demanding rapid development cycles...
Saved in:
| Published in | Transactions on Computational Science X Vol. 6340; pp. 154 - 186 |
|---|---|
| Main Authors | , , , |
| Format | Book Chapter |
| Language | English |
| Published |
Germany
Springer Berlin / Heidelberg
01.01.2010
Springer Berlin Heidelberg |
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 9783642174988 3642174981 |
| ISSN | 0302-9743 1866-4741 |
| DOI | 10.1007/978-3-642-17499-5_7 |
Cover
| Abstract | Security is not merely about technical solutions and patching vulnerabilities. Security is about trade-offs and adhering to realistic security needs, employed to support core business processes. Also, modern systems are subject to a highly competitive market, often demanding rapid development cycles, short life-time, short time-to-market, and small budgets. Security evaluation standards, such as ISO 14508 Common Criteria and ISO/IEC 27002, are not adequate for evaluating the security of many modern systems for resource limitations, time-to-market, and other constraints. Towards this end, we propose an alternative time and cost effective approach for evaluating the security level of a security solution, system or part thereof. Our approach relies on collecting information from different sources, who are trusted to varying degrees, and on using a trust measure to aggregate available information when deriving security level. Our approach is quantitative and implemented as a Bayesian Belief Network (BBN) topology, allowing us to reason over uncertain information and seemingly aggregating disparate information. We illustrate our approach by deriving the security level of two alternative Denial of Service (DoS) solutions. Our approach can also be used in the context of security solution trade-off analysis. |
|---|---|
| AbstractList | Security is not merely about technical solutions and patching vulnerabilities. Security is about trade-offs and adhering to realistic security needs, employed to support core business processes. Also, modern systems are subject to a highly competitive market, often demanding rapid development cycles, short life-time, short time-to-market, and small budgets. Security evaluation standards, such as ISO 14508 Common Criteria and ISO/IEC 27002, are not adequate for evaluating the security of many modern systems for resource limitations, time-to-market, and other constraints. Towards this end, we propose an alternative time and cost effective approach for evaluating the security level of a security solution, system or part thereof. Our approach relies on collecting information from different sources, who are trusted to varying degrees, and on using a trust measure to aggregate available information when deriving security level. Our approach is quantitative and implemented as a Bayesian Belief Network (BBN) topology, allowing us to reason over uncertain information and seemingly aggregating disparate information. We illustrate our approach by deriving the security level of two alternative Denial of Service (DoS) solutions. Our approach can also be used in the context of security solution trade-off analysis. |
| Author | Ray, Indrakshi Chakraborty, Sudip Houmb, Siv Hilde Ray, Indrajit |
| Author_xml | – sequence: 1 givenname: Siv Hilde surname: Houmb fullname: Houmb, Siv Hilde email: sivhoumb@securenok.com organization: SecureNOK Ltd., – sequence: 2 givenname: Indrakshi surname: Ray fullname: Ray, Indrakshi email: iray@cs.colostate.edu organization: Colorado State University, – sequence: 3 givenname: Indrajit surname: Ray fullname: Ray, Indrajit email: indrajit@cs.colostate.edu organization: Colorado State University, – sequence: 4 givenname: Sudip surname: Chakraborty fullname: Chakraborty, Sudip email: schakraborty@valdosta.edu organization: Valdosta State University, |
| BookMark | eNo1kEtOwzAQQA0URFp6Aja5gMH2OHaypKV8pAoWtBI7y2nGEBolJU6KenvcFmYzms8bjd6QDOqmRkKuObvhjOnbTKcUqJKCci2zjCZGn5AhhMahfj8lEU-VolJLfkbGYf1_lqYDEjFggmZawgWJVKZFBgrSSzL2_ouFkFrpNInI_aLtfUcn1mMRv-Gqb8tuF89xi1U829qqt13Z1PHSl_VHPLE79KWt4wlWJbr4Bbufpl37K3LubOVx_JdHZPkwW0yf6Pz18Xl6N6cbIXlHreZFAsIKyRyqguWq0ErxXKWO5QnjmBQArtBSKGkLSLmTObrMJZYzcEkOI8KPd_2mDf9ga_KmWXvDmdkrM8GBARMsmIMiE5QFBo7Mpm2-e_SdwT20wrprbbX6tJsOW2-AKSWAGy4NVxn8AuLla7Q |
| ContentType | Book Chapter |
| Copyright | Springer-Verlag Berlin Heidelberg 2010 |
| Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2010 |
| DBID | FFUUA |
| DOI | 10.1007/978-3-642-17499-5_7 |
| DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISBN | 364217499X 9783642174995 |
| EISSN | 1866-4741 |
| Editor | Tan, C. J. Kenneth Gavrilova, Marina L |
| Editor_xml | – sequence: 1 fullname: Gavrilova, Marina L – sequence: 3 fullname: Tan, C. J. Kenneth |
| EndPage | 186 |
| ExternalDocumentID | EBC3066231_14_169 |
| GroupedDBID | 089 0D6 0DA 0E8 2HV 38. 4UP 4V3 A4J AABBV AAJYQ AATVQ ABBUY ABBVZ ABCYT ABMKK ABMNI ACDPG ACDTA ACDUY ACZTO AEDXK AEHEY AEJLV AEKFX AEOKE AETDV AEZAY AHNNE AHSMR ALMA_UNASSIGNED_HOLDINGS ATJMZ AZZ BBABE CZZ FFUUA I4C IEZ IW0 JJU MW~ MYL SBO TBMHI TPJZQ TSXQS Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 -DT -GH -~X 1SB 29L 2HA 5QI 875 AASHB ACGFS ADCXD AEFIE EJD F5P FEDTE HVGLF LAS LDH P2P RNI RSU SVGTG VI1 ~02 |
| ID | FETCH-LOGICAL-p241t-a71d532a240fe6d0b6d7661b68f0b501e5d33fd74264ad381f4bef9f5a103f5b3 |
| ISBN | 9783642174988 3642174981 |
| ISSN | 0302-9743 |
| IngestDate | Wed Sep 17 03:58:08 EDT 2025 Tue Oct 21 00:15:51 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| LCCallNum | TK5105.5-5105.9 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-p241t-a71d532a240fe6d0b6d7661b68f0b501e5d33fd74264ad381f4bef9f5a103f5b3 |
| OCLC | 697293638 |
| PQID | EBC3066231_14_169 |
| PageCount | 33 |
| ParticipantIDs | springer_books_10_1007_978_3_642_17499_5_7 proquest_ebookcentralchapters_3066231_14_169 |
| PublicationCentury | 2000 |
| PublicationDate | 2010-01-01 |
| PublicationDateYYYYMMDD | 2010-01-01 |
| PublicationDate_xml | – month: 01 year: 2010 text: 2010-01-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Germany |
| PublicationPlace_xml | – name: Germany – name: Berlin, Heidelberg |
| PublicationSeriesTitle | Lecture Notes in Computer Science |
| PublicationSubtitle | Special Issue on Security in Computing, Part I |
| PublicationTitle | Transactions on Computational Science X |
| PublicationYear | 2010 |
| Publisher | Springer Berlin / Heidelberg Springer Berlin Heidelberg |
| Publisher_xml | – name: Springer Berlin / Heidelberg – name: Springer Berlin Heidelberg |
| RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Nierstrasz, Oscar Steffen, Bernhard Kittler, Josef Vardi, Moshe Y. Weikum, Gerhard Sudan, Madhu Naor, Moni Mitchell, John C. Terzopoulos, Demetri Pandu Rangan, C. Kanade, Takeo Hutchison, David Tygar, Doug |
| RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, Lancaster, UK – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, UK – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: ETH Zurich, Zurich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford University, Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: Oscar surname: Nierstrasz fullname: Nierstrasz, Oscar organization: University of Bern, Bern, Switzerland – sequence: 9 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology, Madras, India – sequence: 10 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: University of Dortmund, Dortmund, Germany – sequence: 11 givenname: Madhu surname: Sudan fullname: Sudan, Madhu organization: Massachusetts Institute of Technology, USA – sequence: 12 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 13 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: University of California, Berkeley, USA – sequence: 14 givenname: Moshe Y. surname: Vardi fullname: Vardi, Moshe Y. organization: Rice University, Houston, USA – sequence: 15 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max-Planck Institute of Computer Science, Saarbrücken, Germany |
| SSID | ssj0000476785 ssj0002792 |
| Score | 1.8151884 |
| Snippet | Security is not merely about technical solutions and patching vulnerabilities. Security is about trade-offs and adhering to realistic security needs, employed... |
| SourceID | springer proquest |
| SourceType | Publisher |
| StartPage | 154 |
| SubjectTerms | bayesian belief networks common criteria security evaluation trust |
| Title | Trust-Based Security Level Evaluation Using Bayesian Belief Networks |
| URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3066231&ppg=169 http://link.springer.com/10.1007/978-3-642-17499-5_7 |
| Volume | 6340 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT-MwELWgXJY98LEgvuUDJ4pRjGOHHCkUIQScAPVmxbF9LOxSDvDrd8aOm6ZwgUvUREnkznPs8XjeG0IOc-6rUljDTM0ly2E0YJUwnklTSGWVz89CaODuXl0_5jcjOWqrtwV2ycSc1B9f8kp-gipcA1yRJfsNZKcvhQvwG_CFIyAMxznntxtmbWeZSEsIIf9YnyHF9tI3O-r0CSRYsAFMXLYJtIMLfotpQ_3hVPW7H7MIBtW7CwTLgQM31SMzGHO4OmGCkG02GyZIYcJ-o6KFmuhfKWkFVkeO65QylttLo6QSUVbp05A7m2UBTzJ8tGRSF-0Mk3bVeazKMidwPRxcCNShFxzWIRrvefnLsCwYbp83NVIWySI0rEeWzoc3t0_TIFqWFzDZSuTspEbzqKrU_omp1FRUE55rZGdhMbcXHlyMh1XyG2knFPkg0Ow1suDG62QlFd2gDZ7rZHlGQfIPuZyBlCZIaYCUtpDSAClNkNIIKU2QbpDHq-HDxTVrCmOwF3C4JqwquJXitAJvzDtlM6NsAX6WUWc-MzLjTlohvC3Q260s-GQ-N86XXlY8E14asUl64-ex2yI0c7wuSulErUwuYaVVK-W5qbjxJZydbpPjZB8dtu-bnOE6WuNVd6HbJkfJhhrvftVJFhtsr4UG2-tgew223_neu3fJr7Zj75He5N-b2wePcGIOmn7xH3v_Xbg |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Transactions+on+Computational+Science+X&rft.atitle=Trust-Based+Security+Level+Evaluation+Using+Bayesian+Belief+Networks&rft.date=2010-01-01&rft.pub=Springer+Berlin+%2F+Heidelberg&rft.isbn=9783642174988&rft.volume=6340&rft_id=info:doi/10.1007%2F978-3-642-17499-5_7&rft.externalDBID=169&rft.externalDocID=EBC3066231_14_169 |
| thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3066231-l.jpg |