Trust-Based Security Level Evaluation Using Bayesian Belief Networks

Security is not merely about technical solutions and patching vulnerabilities. Security is about trade-offs and adhering to realistic security needs, employed to support core business processes. Also, modern systems are subject to a highly competitive market, often demanding rapid development cycles...

Full description

Saved in:
Bibliographic Details
Published inTransactions on Computational Science X Vol. 6340; pp. 154 - 186
Main Authors Houmb, Siv Hilde, Ray, Indrakshi, Ray, Indrajit, Chakraborty, Sudip
Format Book Chapter
LanguageEnglish
Published Germany Springer Berlin / Heidelberg 01.01.2010
Springer Berlin Heidelberg
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783642174988
3642174981
ISSN0302-9743
1866-4741
DOI10.1007/978-3-642-17499-5_7

Cover

Abstract Security is not merely about technical solutions and patching vulnerabilities. Security is about trade-offs and adhering to realistic security needs, employed to support core business processes. Also, modern systems are subject to a highly competitive market, often demanding rapid development cycles, short life-time, short time-to-market, and small budgets. Security evaluation standards, such as ISO 14508 Common Criteria and ISO/IEC 27002, are not adequate for evaluating the security of many modern systems for resource limitations, time-to-market, and other constraints. Towards this end, we propose an alternative time and cost effective approach for evaluating the security level of a security solution, system or part thereof. Our approach relies on collecting information from different sources, who are trusted to varying degrees, and on using a trust measure to aggregate available information when deriving security level. Our approach is quantitative and implemented as a Bayesian Belief Network (BBN) topology, allowing us to reason over uncertain information and seemingly aggregating disparate information. We illustrate our approach by deriving the security level of two alternative Denial of Service (DoS) solutions. Our approach can also be used in the context of security solution trade-off analysis.
AbstractList Security is not merely about technical solutions and patching vulnerabilities. Security is about trade-offs and adhering to realistic security needs, employed to support core business processes. Also, modern systems are subject to a highly competitive market, often demanding rapid development cycles, short life-time, short time-to-market, and small budgets. Security evaluation standards, such as ISO 14508 Common Criteria and ISO/IEC 27002, are not adequate for evaluating the security of many modern systems for resource limitations, time-to-market, and other constraints. Towards this end, we propose an alternative time and cost effective approach for evaluating the security level of a security solution, system or part thereof. Our approach relies on collecting information from different sources, who are trusted to varying degrees, and on using a trust measure to aggregate available information when deriving security level. Our approach is quantitative and implemented as a Bayesian Belief Network (BBN) topology, allowing us to reason over uncertain information and seemingly aggregating disparate information. We illustrate our approach by deriving the security level of two alternative Denial of Service (DoS) solutions. Our approach can also be used in the context of security solution trade-off analysis.
Author Ray, Indrakshi
Chakraborty, Sudip
Houmb, Siv Hilde
Ray, Indrajit
Author_xml – sequence: 1
  givenname: Siv Hilde
  surname: Houmb
  fullname: Houmb, Siv Hilde
  email: sivhoumb@securenok.com
  organization: SecureNOK Ltd.,  
– sequence: 2
  givenname: Indrakshi
  surname: Ray
  fullname: Ray, Indrakshi
  email: iray@cs.colostate.edu
  organization: Colorado State University,  
– sequence: 3
  givenname: Indrajit
  surname: Ray
  fullname: Ray, Indrajit
  email: indrajit@cs.colostate.edu
  organization: Colorado State University,  
– sequence: 4
  givenname: Sudip
  surname: Chakraborty
  fullname: Chakraborty, Sudip
  email: schakraborty@valdosta.edu
  organization: Valdosta State University,  
BookMark eNo1kEtOwzAQQA0URFp6Aja5gMH2OHaypKV8pAoWtBI7y2nGEBolJU6KenvcFmYzms8bjd6QDOqmRkKuObvhjOnbTKcUqJKCci2zjCZGn5AhhMahfj8lEU-VolJLfkbGYf1_lqYDEjFggmZawgWJVKZFBgrSSzL2_ouFkFrpNInI_aLtfUcn1mMRv-Gqb8tuF89xi1U829qqt13Z1PHSl_VHPLE79KWt4wlWJbr4Bbufpl37K3LubOVx_JdHZPkwW0yf6Pz18Xl6N6cbIXlHreZFAsIKyRyqguWq0ErxXKWO5QnjmBQArtBSKGkLSLmTObrMJZYzcEkOI8KPd_2mDf9ga_KmWXvDmdkrM8GBARMsmIMiE5QFBo7Mpm2-e_SdwT20wrprbbX6tJsOW2-AKSWAGy4NVxn8AuLla7Q
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2010
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2010
DBID FFUUA
DOI 10.1007/978-3-642-17499-5_7
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 364217499X
9783642174995
EISSN 1866-4741
Editor Tan, C. J. Kenneth
Gavrilova, Marina L
Editor_xml – sequence: 1
  fullname: Gavrilova, Marina L
– sequence: 3
  fullname: Tan, C. J. Kenneth
EndPage 186
ExternalDocumentID EBC3066231_14_169
GroupedDBID 089
0D6
0DA
0E8
2HV
38.
4UP
4V3
A4J
AABBV
AAJYQ
AATVQ
ABBUY
ABBVZ
ABCYT
ABMKK
ABMNI
ACDPG
ACDTA
ACDUY
ACZTO
AEDXK
AEHEY
AEJLV
AEKFX
AEOKE
AETDV
AEZAY
AHNNE
AHSMR
ALMA_UNASSIGNED_HOLDINGS
ATJMZ
AZZ
BBABE
CZZ
FFUUA
I4C
IEZ
IW0
JJU
MW~
MYL
SBO
TBMHI
TPJZQ
TSXQS
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
-DT
-GH
-~X
1SB
29L
2HA
5QI
875
AASHB
ACGFS
ADCXD
AEFIE
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-p241t-a71d532a240fe6d0b6d7661b68f0b501e5d33fd74264ad381f4bef9f5a103f5b3
ISBN 9783642174988
3642174981
ISSN 0302-9743
IngestDate Wed Sep 17 03:58:08 EDT 2025
Tue Oct 21 00:15:51 EDT 2025
IsPeerReviewed true
IsScholarly true
LCCallNum TK5105.5-5105.9
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p241t-a71d532a240fe6d0b6d7661b68f0b501e5d33fd74264ad381f4bef9f5a103f5b3
OCLC 697293638
PQID EBC3066231_14_169
PageCount 33
ParticipantIDs springer_books_10_1007_978_3_642_17499_5_7
proquest_ebookcentralchapters_3066231_14_169
PublicationCentury 2000
PublicationDate 2010-01-01
PublicationDateYYYYMMDD 2010-01-01
PublicationDate_xml – month: 01
  year: 2010
  text: 2010-01-01
  day: 01
PublicationDecade 2010
PublicationPlace Germany
PublicationPlace_xml – name: Germany
– name: Berlin, Heidelberg
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSubtitle Special Issue on Security in Computing, Part I
PublicationTitle Transactions on Computational Science X
PublicationYear 2010
Publisher Springer Berlin / Heidelberg
Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin / Heidelberg
– name: Springer Berlin Heidelberg
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Steffen, Bernhard
Kittler, Josef
Vardi, Moshe Y.
Weikum, Gerhard
Sudan, Madhu
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, Lancaster, UK
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, UK
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zurich, Zurich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University, Stanford, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
  organization: University of Bern, Bern, Switzerland
– sequence: 9
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology, Madras, India
– sequence: 10
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: University of Dortmund, Dortmund, Germany
– sequence: 11
  givenname: Madhu
  surname: Sudan
  fullname: Sudan, Madhu
  organization: Massachusetts Institute of Technology, USA
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 13
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
  organization: University of California, Berkeley, USA
– sequence: 14
  givenname: Moshe Y.
  surname: Vardi
  fullname: Vardi, Moshe Y.
  organization: Rice University, Houston, USA
– sequence: 15
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max-Planck Institute of Computer Science, Saarbrücken, Germany
SSID ssj0000476785
ssj0002792
Score 1.8151884
Snippet Security is not merely about technical solutions and patching vulnerabilities. Security is about trade-offs and adhering to realistic security needs, employed...
SourceID springer
proquest
SourceType Publisher
StartPage 154
SubjectTerms bayesian belief networks
common criteria
security evaluation
trust
Title Trust-Based Security Level Evaluation Using Bayesian Belief Networks
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3066231&ppg=169
http://link.springer.com/10.1007/978-3-642-17499-5_7
Volume 6340
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT-MwELWgXJY98LEgvuUDJ4pRjGOHHCkUIQScAPVmxbF9LOxSDvDrd8aOm6ZwgUvUREnkznPs8XjeG0IOc-6rUljDTM0ly2E0YJUwnklTSGWVz89CaODuXl0_5jcjOWqrtwV2ycSc1B9f8kp-gipcA1yRJfsNZKcvhQvwG_CFIyAMxznntxtmbWeZSEsIIf9YnyHF9tI3O-r0CSRYsAFMXLYJtIMLfotpQ_3hVPW7H7MIBtW7CwTLgQM31SMzGHO4OmGCkG02GyZIYcJ-o6KFmuhfKWkFVkeO65QylttLo6QSUVbp05A7m2UBTzJ8tGRSF-0Mk3bVeazKMidwPRxcCNShFxzWIRrvefnLsCwYbp83NVIWySI0rEeWzoc3t0_TIFqWFzDZSuTspEbzqKrU_omp1FRUE55rZGdhMbcXHlyMh1XyG2knFPkg0Ow1suDG62QlFd2gDZ7rZHlGQfIPuZyBlCZIaYCUtpDSAClNkNIIKU2QbpDHq-HDxTVrCmOwF3C4JqwquJXitAJvzDtlM6NsAX6WUWc-MzLjTlohvC3Q260s-GQ-N86XXlY8E14asUl64-ex2yI0c7wuSulErUwuYaVVK-W5qbjxJZydbpPjZB8dtu-bnOE6WuNVd6HbJkfJhhrvftVJFhtsr4UG2-tgew223_neu3fJr7Zj75He5N-b2wePcGIOmn7xH3v_Xbg
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Transactions+on+Computational+Science+X&rft.atitle=Trust-Based+Security+Level+Evaluation+Using+Bayesian+Belief+Networks&rft.date=2010-01-01&rft.pub=Springer+Berlin+%2F+Heidelberg&rft.isbn=9783642174988&rft.volume=6340&rft_id=info:doi/10.1007%2F978-3-642-17499-5_7&rft.externalDBID=169&rft.externalDocID=EBC3066231_14_169
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3066231-l.jpg