Risk Propagation Analysis and Visualization using Percolation Theory

Abstract

This article presents a percolation-based approach for the analysis of risk propagation, using malware spreading as a showcase example. Conventional risk management is often driven by human (subjective) assessment of how one risk influences the other, respectively, how security incidents can affect subsequent problems in interconnected (sub)systems of an infrastructure. Using percolation theory, a well-established methodology in the fields of epidemiology and disease spreading, a simple simulation-based method is described to assess risk propagation system-atically. This simulation is formally analyzed using percolation theory, to obtain closed form criteria that help predicting a pandemic incident propagation (or a propagation with average-case bounded implications). The method is designed as a security decision support tool, e.g., to be used in security operation centers. For that matter, a flexible visualization technique is devised, which is naturally induced by the percolation model and the simulation algorithm that derives from it. The main output of the model is a graphical visualization of the infrastructure (physical or logical topology). This representation uses color codes to indicate the likelihood of problems to arise from a security incident that initially occurs at a given point in the system. Large likelihoods for problems thus indicate “hotspots”, where additional action should be taken.

Authors and Affiliations

Sandra Konig, Stefan Rass, Alexander Beck

Keywords

Related Articles

Image based Arabic Sign Language Recognition System

Through history, humans have used many ways of communication such as gesturing, sounds, drawing, writing, and speaking. However, deaf and speaking impaired people cannot use speaking to communicate with others, which may...

A Simple Exercise-to-Play Proposal that would Reduce Games Addiction and Keep Players Healthy

Games players usually get addicted to video games in general and more specifically to those that are usually played over the internet. These players prefer to stay at home and play games rather than playing sports or out...

Evaluation of Perception and Performance in ICT Related Courses

Some teaching methods adopted for disseminating Information Communication Technology Related Courses (ICTRC) in institutions of learning have been observed to be inadequate in bringing about the right perception and perf...

OVERALL SENSITIVITY ANALYSIS UTILIZING BAYESIAN NETWORK FOR THE QUESTIONNAIRE INVESTIGATION ON SNS

Social Networking Service (SNS) is prevailing rapidly in Japan in recent years. The most popular ones are Facebook, mixi, and Twitter, which are utilized in various fields of life together with the convenient tool such a...

Investigating the Effect of Different Kernel Functions on the Performance of SVM for Recognizing Arabic Characters

A considerable progress in the recognition techniques of Latin and Chinese characters has been achieved. By contrast, Arabic Optical character Recognition is still lagging in spite that the interest and research in this...

Download PDF file
  • EP ID EP117666
  • DOI 10.14569/IJACSA.2016.070194
  • Views 83
  • Downloads 0

How To Cite

Sandra Konig, Stefan Rass, Alexander Beck (2016). Risk Propagation Analysis and Visualization using Percolation Theory. International Journal of Advanced Computer Science & Applications, 7(1), 694-701. https://europub.co.uk/articles/-A-117666