Treat Assessment Framework in Analysing Network Threat Occurrence
Threat assessment of network security assists in identifying potential risks and vulnerabilities. By understanding the threats, their potential impact, and the probability of their occurrence, organizations can proactively implement the necessary security controls and countermeasures to mitigate the...
Published in: | 8th International Conference on Recent Advances and Innovations in Engineering: Empowering Computing, Analytics, and Engineering Through Digital Innovation, ICRAIE 2023 |
---|---|
Main Author: | |
Format: | Conference paper |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85189928065&doi=10.1109%2fICRAIE59459.2023.10468340&partnerID=40&md5=aff39a56e5ed5845ffdfcb567330fac9 |
id |
2-s2.0-85189928065 |
---|---|
spelling |
2-s2.0-85189928065 Awang N.; Samy G.A.-L.N.; Hassan N.H.B. Treat Assessment Framework in Analysing Network Threat Occurrence 2023 8th International Conference on Recent Advances and Innovations in Engineering: Empowering Computing, Analytics, and Engineering Through Digital Innovation, ICRAIE 2023 10.1109/ICRAIE59459.2023.10468340 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85189928065&doi=10.1109%2fICRAIE59459.2023.10468340&partnerID=40&md5=aff39a56e5ed5845ffdfcb567330fac9 Threat assessment of network security assists in identifying potential risks and vulnerabilities. By understanding the threats, their potential impact, and the probability of their occurrence, organizations can proactively implement the necessary security controls and countermeasures to mitigate the risks. Using a mixed method methodology, this research implemented the semi-structured interview and experimental data collection to assess network threats, emphasizing the significance of a tailored framework for university networks. Semi-structured interviews were conducted with network security administrators, risk management experts, and network security experts. The process of experimental data collection involves gathering data from the university firewall during a specific time period in order to identify occurrences of potential threats. In addition, the developed threat assessment utilized machine learning methods to determine the occurrence of threats using a time series analysis algorithm. The findings contribute to developing a comprehensive threat assessment framework that supports decision-making processes for university network security. © 2023 IEEE. Institute of Electrical and Electronics Engineers Inc. English Conference paper |
author |
Awang N.; Samy G.A.-L.N.; Hassan N.H.B. |
spellingShingle |
Awang N.; Samy G.A.-L.N.; Hassan N.H.B. Treat Assessment Framework in Analysing Network Threat Occurrence |
author_facet |
Awang N.; Samy G.A.-L.N.; Hassan N.H.B. |
author_sort |
Awang N.; Samy G.A.-L.N.; Hassan N.H.B. |
title |
Treat Assessment Framework in Analysing Network Threat Occurrence |
title_short |
Treat Assessment Framework in Analysing Network Threat Occurrence |
title_full |
Treat Assessment Framework in Analysing Network Threat Occurrence |
title_fullStr |
Treat Assessment Framework in Analysing Network Threat Occurrence |
title_full_unstemmed |
Treat Assessment Framework in Analysing Network Threat Occurrence |
title_sort |
Treat Assessment Framework in Analysing Network Threat Occurrence |
publishDate |
2023 |
container_title |
8th International Conference on Recent Advances and Innovations in Engineering: Empowering Computing, Analytics, and Engineering Through Digital Innovation, ICRAIE 2023 |
container_volume |
|
container_issue |
|
doi_str_mv |
10.1109/ICRAIE59459.2023.10468340 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85189928065&doi=10.1109%2fICRAIE59459.2023.10468340&partnerID=40&md5=aff39a56e5ed5845ffdfcb567330fac9 |
description |
Threat assessment of network security assists in identifying potential risks and vulnerabilities. By understanding the threats, their potential impact, and the probability of their occurrence, organizations can proactively implement the necessary security controls and countermeasures to mitigate the risks. Using a mixed method methodology, this research implemented the semi-structured interview and experimental data collection to assess network threats, emphasizing the significance of a tailored framework for university networks. Semi-structured interviews were conducted with network security administrators, risk management experts, and network security experts. The process of experimental data collection involves gathering data from the university firewall during a specific time period in order to identify occurrences of potential threats. In addition, the developed threat assessment utilized machine learning methods to determine the occurrence of threats using a time series analysis algorithm. The findings contribute to developing a comprehensive threat assessment framework that supports decision-making processes for university network security. © 2023 IEEE. |
publisher |
Institute of Electrical and Electronics Engineers Inc. |
issn |
|
language |
English |
format |
Conference paper |
accesstype |
|
record_format |
scopus |
collection |
Scopus |
_version_ |
1809677779461996544 |