Cyber Attacks Prediction Model Based on Bayesian Network

@article{Wu2012CyberAP,
  title={Cyber Attacks Prediction Model Based on Bayesian Network},
  author={Jinyu Wu and Lihua Yin and Yunchuan Guo},
  journal={2012 IEEE 18th International Conference on Parallel and Distributed Systems},
  year={2012},
  pages={730-731}
}
Cyber attacks prediction is an important part of risk management. Existing cyber attacks prediction methods did not fully consider the specific environment factors of the target network, which may make the results deviate from the true situation. In this paper, we propose a cyber attacks prediction model based on Bayesian network. We use attack graphs to represent all the vulnerabilities and possible attack paths. Then we capture the using environment factors using Bayesian network model. Cyber… CONTINUE READING

Figures and Topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
SHOWING 1-10 OF 14 CITATIONS

A Privacy Analysis Method to Anonymous Graph Based on Bayes Rule in Social Networks

  • 2018 14th International Conference on Computational Intelligence and Security (CIS)
  • 2018
VIEW 1 EXCERPT
CITES METHODS

Cyber Security Inference Based on a Two-Level Bayesian Network Framework

  • 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC)
  • 2018

References

Publications referenced by this paper.
SHOWING 1-6 OF 6 REFERENCES

Dynamic Security Risk Management Using Bayesian Attack Graphs

  • IEEE Transactions on Dependable and Secure Computing
  • 2012
VIEW 1 EXCERPT

Using Bayesian networks for cyber security analysis

  • 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN)
  • 2010
VIEW 1 EXCERPT

A scalable approach to attack graph generation

  • ACM Conference on Computer and Communications Security
  • 2006
VIEW 1 EXCERPT

Two formal analyses of attack graphs

Somesh Jha, Oleg Sheyner, Jeannette M. Wing
  • Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15
  • 2002
VIEW 1 EXCERPT