Risk Propagation Analysis and Visualization using Percolation Theory

Abstract

This article presents a percolation-based approach for the analysis of risk propagation, using malware spreading as a showcase example. Conventional risk management is often driven by human (subjective) assessment of how one risk influences the other, respectively, how security incidents can affect subsequent problems in interconnected (sub)systems of an infrastructure. Using percolation theory, a well-established methodology in the fields of epidemiology and disease spreading, a simple simulation-based method is described to assess risk propagation system-atically. This simulation is formally analyzed using percolation theory, to obtain closed form criteria that help predicting a pandemic incident propagation (or a propagation with average-case bounded implications). The method is designed as a security decision support tool, e.g., to be used in security operation centers. For that matter, a flexible visualization technique is devised, which is naturally induced by the percolation model and the simulation algorithm that derives from it. The main output of the model is a graphical visualization of the infrastructure (physical or logical topology). This representation uses color codes to indicate the likelihood of problems to arise from a security incident that initially occurs at a given point in the system. Large likelihoods for problems thus indicate “hotspots”, where additional action should be taken.

Authors and Affiliations

Sandra Konig, Stefan Rass, Alexander Beck

Keywords

Related Articles

Design of Efficient Pipelined Router Architecture for 3D Network on Chip

As a relevant communication structure for integrated circuits, Network-on-Chip (NoC) architecture has attracted a range of research topics. Compared to conventional bus technology, NoC provides higher scalability and enh...

Software Architecture Solutions for the Internet of Things: A Taxonomy of Existing Solutions and Vision for the Emerging Research

Recently, Internet of Thing (IoT) systems enable an interconnection between systems, humans, and services to create an (autonomous) ecosystem of various computation-intensive things. Software architecture supports an eff...

Non-intrusive Driver Drowsiness Detection based on Face and Eye Tracking

The rate of annual road accidents attributed to drowsy driving are significantly high. Due to this, researchers have proposed several methods aimed at detecting drivers’ drowsiness. These methods include subjective, phys...

A Decision Tree Classification Model for University Admission System

Data mining is the science and techniques used to analyze data to discover and extract previously unknown patterns. It is also considered a main part of the process of knowledge discovery in databases (KDD). In this pape...

Distributed Optimization Model of Wavelet Neuron for Human Iris Verification

Automatic human iris verification is an active research area with numerous applications in security purposes. Unfortunately, most of feature extraction methods in human iris verification systems are sensitive to noise, s...

Download PDF file
  • EP ID EP117666
  • DOI 10.14569/IJACSA.2016.070194
  • Views 96
  • Downloads 0

How To Cite

Sandra Konig, Stefan Rass, Alexander Beck (2016). Risk Propagation Analysis and Visualization using Percolation Theory. International Journal of Advanced Computer Science & Applications, 7(1), 694-701. https://europub.co.uk/articles/-A-117666