Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

An Adaptive Decision-Support Model for Data Communication Network Security Risk Management

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 106 - Number 8
Year of Publication: 2014
Authors:
Akinyemi Bodunde Odunola
Amoo Adekemi Olawumi
Olajubu Emmanuel Ajayi
10.5120/18537-9752

Akinyemi Bodunde Odunola, Amoo Adekemi Olawumi and Olajubu Emmanuel Ajayi. Article: An Adaptive Decision-Support Model for Data Communication Network Security Risk Management. International Journal of Computer Applications 106(8):1-7, November 2014. Full text available. BibTeX

@article{key:article,
	author = {Akinyemi Bodunde Odunola and Amoo Adekemi Olawumi and Olajubu Emmanuel Ajayi},
	title = {Article: An Adaptive Decision-Support Model for Data Communication Network Security Risk Management},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {106},
	number = {8},
	pages = {1-7},
	month = {November},
	note = {Full text available}
}

Abstract

In this paper, the requirements and methodological issues to build a prediction model for network performances in the face of security risks was presented. Attempt was made to investigate risk management approaches that are most relevant to network security and to establish a formal model with a level of detail sufficient to enable realistic predictions of operational network behavior, portray security measurements and properties of the network accurately and consequently incorporate relevant objects of significance to the network security risk management. The proposed model will predetermine the effect of network security risk factors on the network Confidentiality, Integrity and Availability. This will enable early detection of network security risk problems which in turn should quickly alert the network administrator of any problem area in the network environment and make effective decision for quality of services.

References

  • Wang, C. and Wulf, W. A. 1997. Towards a Framework for Security Measurement. In Proceedings of the Twentieth National Information Systems Security Conference, Baltimore, MD, October 1997, 522-533.
  • Eloff, J. H. P. , Labuschagne, L. and Badenhorst, K. P. (1993). A Comparative Framework for Risk Analysis Methods. Computers & Security, 12:597-603.
  • Hyland, P. C. and Sandhu, R. 1998. Management of Network Security Applications. In Proceedings of the 21st NIST-NCSC National Information Systems Security Conference, Arlington, Virginia.
  • Alberts, C. J. and Dorofee, A. J. 2002. Managing Information Security Risks: The OCTAVE Approach, Addison -Wesley Professional, ISBN: 0321118863.
  • Lund, M. S. , Solhaug, B. and Stølen K. 2011. Risk Analysis of Changing and Evolving Systems Using CORAS. Foundations of Security Analysis and Design VI (FOSAD'11), in Lecture Notes in Computer Science, Springer, 6858:231-274.
  • Dimitrakos, T. , Ritchie, B. , Raptis, D. and Stølen, K. 2002. Model -based Security Risk Analysis for Web Applications: The CORAS approach. In Euroweb 2002 - The Web and the GRID: from e-science to e-business.
  • Mayer, N. , Heymans, P. and Matulevi?ius, R. 2007. Design of a Modelling Language for Information System Security Risk Management. In Proceedings of the 1st International Conference on Research Challenges in Information Science (RCIS 2007)Ouarzazate, Morocco, pp 121–131.
  • Dubois, É. , Heymans, P. , Mayer, N. and Matulevi?ius, R. 2010. A Systematic Approach to Define the Domain of Information System Security Risk Management. Intentional Perspectives on Information Systems Engineering, Springer. pp 289-306.
  • Stroie, E. R. and Rusu, A. C. 2011. Security Risk Management - Approaches and Methodology. Informatica Economic?, 15(1):228-240.
  • Gehani, A. , Zaniewski, L. and Subramani, K. 2011. Algorithmic Aspects of Risk Management. Agha G. , Danvy O. , and Meseguer J. (Eds. ): Talcott Festschrift, LNCS, 7000: 262–276.
  • Saleh, Z. I. , Refai, H. and Mashhour, A. 2011. Proposed Framework for Security Risk Assessment. Journal of Information Security, 2:85-90.
  • Paokanta, P. and Harnpornchai, N. 2009. Construction of Bayesian Networks for Risk Assessment of Software Project by Knowledge Engineering. 3rd International Conference on Software, Knowledge, Information Management and Applications, ISBN: 9781851432516. 154-158.
  • Xie, P. , Li, J. H. , Ou, X. , Liu, P. and Levy, R. 2010. Using Bayesian Networks for Cyber Security Analysis. In Proceedings of the 40th IEEE/IFIP International Conference on Dependable Systems and Networks. China. 211-220.
  • Poolsappasit, N. , Dewri, R. and Ray, I. 2012. Dynamic Security Risk Management Using Bayesian Attack Graphs. IEEE Transactions on Dependable and Secure Computing, 9(1):61-74.
  • Calder, A. and Watkins, S. G. 2007. Information Security Risk Management for ISO27001/ISO17799, IT Governance Publishing.
  • Stoneburner, G. , Goguen, A. and Feringa, A. 2002. Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology (NIST), Gaithersburg, MD 20899-8930, NIST Special Publication 800-30.