System Simulation of a Bayesian Network-Based Performance Prediction Model for Data Communication Networks

In this paper, a paradigm of a Bayesian Network–based performance prediction model for computer networks security risk management was emulated. Model simulation was carried out for the prediction model formulated. Java programming language tools were used to simulate, validate and verify the model. The core of simulation program was written in Java programming language. Some jar files were created in the code logic for all the modules in the prediction model. MS-DOS or command prompt was used to compile and run java and jar files. Batch scripts i.e. .bat files were written to compile the jar files. The output of the execution is shown using Java API files. Simulation technology was used in this study to evaluate network performance since it is very costly to deploy a complete test bed containing multiple networked computers, routers and data links to validate and verify the prediction model. The resulting risk impact on network confidentiality, Integrity and availability determine the criticality of the overall network performance which will aid in the effective application of countermeasures to mitigate the effect of network security risks.

[1]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[2]  Ehab Al-Shaer,et al.  A Novel Quantitative Approach For Measuring Network Security , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[3]  Thompson Aderonke,et al.  A Bayesian Network Model for Risk Management in Cyber Situation , 2014 .

[4]  Zakaria I. Saleh,et al.  Proposed Framework for Security Risk Assessment , 2011, J. Information Security.

[5]  Shiliang Sun,et al.  A bayesian network approach to traffic flow forecasting , 2006, IEEE Transactions on Intelligent Transportation Systems.

[6]  P. Maillé,et al.  Of Threats and Costs: A Game-Theoretic Approach to Security Risk Management , 2011 .

[7]  Peng Liu,et al.  Using Bayesian networks for cyber security analysis , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[8]  Elena Ramona Stroie,et al.  Security Risk Management - Approaches and Methodology , 2011 .

[9]  John A. Sokolowski,et al.  Probabilistic Risk Analysis and Terrorism Risk , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[10]  Ram Dantu,et al.  Network risk management using attacker profiling , 2009, Secur. Commun. Networks.

[11]  Wei-Tsong Lee,et al.  Constructing Enterprise Information Network Security Risk Management Mechanism by Ontology , 2010 .

[12]  Jeannette M. Wing,et al.  Game strategies in network security , 2005, International Journal of Information Security.

[13]  Antonio Puliafito,et al.  Using mobile agents to implement flexible network management strategies , 2000, Comput. Commun..

[14]  David Lee,et al.  Passive testing and applications to network management , 1997, Proceedings 1997 International Conference on Network Protocols.

[15]  Jan Guynes Clark,et al.  Why there aren't more information security research studies , 2004, Inf. Manag..

[16]  Akinyemi Bodunde Odunola,et al.  Performance Prediction Model for Network Security Risk Management , 2015 .

[17]  Suleyman Kondakci Network Security Risk Assessment Using Bayesian Belief Networks , 2010, 2010 IEEE Second International Conference on Social Computing.

[18]  Indrajit Ray,et al.  Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.

[19]  Akinyemi Bodunde Odunola,et al.  An Adaptive Decision-Support Model for Data Communication Network Security Risk Management , 2014 .

[20]  Stuart E. Schechter Toward econometric models of the security risk from remote attacks , 2005, IEEE Security & Privacy.

[21]  Tansu Alpcan,et al.  Coalitional Game Theory for Security Risk Management , 2010, 2010 Fifth International Conference on Internet Monitoring and Protection.

[22]  Kevin B. Korb,et al.  Parameterisation and evaluation of a Bayesian network for use in an ecological risk assessment , 2007, Environ. Model. Softw..

[23]  Hai-feng Wang,et al.  Prediction model of network security situation based on regression analysis , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.