We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

An Adaptive Decision-Support Model for Data Communication Network Security Risk Management

by Akinyemi Bodunde Odunola, Amoo Adekemi Olawumi, Olajubu Emmanuel Ajayi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 106 - Number 8
Year of Publication: 2014
Authors: Akinyemi Bodunde Odunola, Amoo Adekemi Olawumi, Olajubu Emmanuel Ajayi
10.5120/18537-9752

Akinyemi Bodunde Odunola, Amoo Adekemi Olawumi, Olajubu Emmanuel Ajayi . An Adaptive Decision-Support Model for Data Communication Network Security Risk Management. International Journal of Computer Applications. 106, 8 ( November 2014), 1-7. DOI=10.5120/18537-9752

@article{ 10.5120/18537-9752,
author = { Akinyemi Bodunde Odunola, Amoo Adekemi Olawumi, Olajubu Emmanuel Ajayi },
title = { An Adaptive Decision-Support Model for Data Communication Network Security Risk Management },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 106 },
number = { 8 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume106/number8/18537-9752/ },
doi = { 10.5120/18537-9752 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:39:22.683473+05:30
%A Akinyemi Bodunde Odunola
%A Amoo Adekemi Olawumi
%A Olajubu Emmanuel Ajayi
%T An Adaptive Decision-Support Model for Data Communication Network Security Risk Management
%J International Journal of Computer Applications
%@ 0975-8887
%V 106
%N 8
%P 1-7
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, the requirements and methodological issues to build a prediction model for network performances in the face of security risks was presented. Attempt was made to investigate risk management approaches that are most relevant to network security and to establish a formal model with a level of detail sufficient to enable realistic predictions of operational network behavior, portray security measurements and properties of the network accurately and consequently incorporate relevant objects of significance to the network security risk management. The proposed model will predetermine the effect of network security risk factors on the network Confidentiality, Integrity and Availability. This will enable early detection of network security risk problems which in turn should quickly alert the network administrator of any problem area in the network environment and make effective decision for quality of services.

References
  1. Wang, C. and Wulf, W. A. 1997. Towards a Framework for Security Measurement. In Proceedings of the Twentieth National Information Systems Security Conference, Baltimore, MD, October 1997, 522-533.
  2. Eloff, J. H. P. , Labuschagne, L. and Badenhorst, K. P. (1993). A Comparative Framework for Risk Analysis Methods. Computers & Security, 12:597-603.
  3. Hyland, P. C. and Sandhu, R. 1998. Management of Network Security Applications. In Proceedings of the 21st NIST-NCSC National Information Systems Security Conference, Arlington, Virginia.
  4. Alberts, C. J. and Dorofee, A. J. 2002. Managing Information Security Risks: The OCTAVE Approach, Addison -Wesley Professional, ISBN: 0321118863.
  5. Lund, M. S. , Solhaug, B. and Stølen K. 2011. Risk Analysis of Changing and Evolving Systems Using CORAS. Foundations of Security Analysis and Design VI (FOSAD'11), in Lecture Notes in Computer Science, Springer, 6858:231-274.
  6. Dimitrakos, T. , Ritchie, B. , Raptis, D. and Stølen, K. 2002. Model -based Security Risk Analysis for Web Applications: The CORAS approach. In Euroweb 2002 - The Web and the GRID: from e-science to e-business.
  7. Mayer, N. , Heymans, P. and Matulevi?ius, R. 2007. Design of a Modelling Language for Information System Security Risk Management. In Proceedings of the 1st International Conference on Research Challenges in Information Science (RCIS 2007)Ouarzazate, Morocco, pp 121–131.
  8. Dubois, É. , Heymans, P. , Mayer, N. and Matulevi?ius, R. 2010. A Systematic Approach to Define the Domain of Information System Security Risk Management. Intentional Perspectives on Information Systems Engineering, Springer. pp 289-306.
  9. Stroie, E. R. and Rusu, A. C. 2011. Security Risk Management - Approaches and Methodology. Informatica Economic?, 15(1):228-240.
  10. Gehani, A. , Zaniewski, L. and Subramani, K. 2011. Algorithmic Aspects of Risk Management. Agha G. , Danvy O. , and Meseguer J. (Eds. ): Talcott Festschrift, LNCS, 7000: 262–276.
  11. Saleh, Z. I. , Refai, H. and Mashhour, A. 2011. Proposed Framework for Security Risk Assessment. Journal of Information Security, 2:85-90.
  12. Paokanta, P. and Harnpornchai, N. 2009. Construction of Bayesian Networks for Risk Assessment of Software Project by Knowledge Engineering. 3rd International Conference on Software, Knowledge, Information Management and Applications, ISBN: 9781851432516. 154-158.
  13. Xie, P. , Li, J. H. , Ou, X. , Liu, P. and Levy, R. 2010. Using Bayesian Networks for Cyber Security Analysis. In Proceedings of the 40th IEEE/IFIP International Conference on Dependable Systems and Networks. China. 211-220.
  14. Poolsappasit, N. , Dewri, R. and Ray, I. 2012. Dynamic Security Risk Management Using Bayesian Attack Graphs. IEEE Transactions on Dependable and Secure Computing, 9(1):61-74.
  15. Calder, A. and Watkins, S. G. 2007. Information Security Risk Management for ISO27001/ISO17799, IT Governance Publishing.
  16. Stoneburner, G. , Goguen, A. and Feringa, A. 2002. Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology (NIST), Gaithersburg, MD 20899-8930, NIST Special Publication 800-30.
Index Terms

Computer Science
Information Sciences

Keywords

Predictive Model Impact Network Security Risk Management (NSRM)