Classification of Attributes and Behavior in Risk Management Using Bayesian Networks

PDF Version Also Available for Download.


This paper discusses issues in security.

Physical Description

4 p.

Creation Information

Dantu, Ram; Kolan, Prakash; Loper, Kall & Akl, Robert G. March 2007.


This paper is part of the collection entitled: UNT Scholarly Works and was provided by UNT College of Engineering to Digital Library, a digital repository hosted by the UNT Libraries. It has been viewed 264 times , with 5 in the last month . More information about this paper can be viewed below.


People and organizations associated with either the creation of this paper or its content.


Rights Holders

For guidance see Citations, Rights, Re-Use.

  • Unknown

Provided By

UNT College of Engineering

The UNT College of Engineering promotes intellectual and scholarly pursuits in the areas of computer science and engineering, preparing innovative leaders in a variety of disciplines. The UNT College of Engineering encourages faculty and students to pursue interdisciplinary research among numerous subjects of study including databases, numerical analysis, game programming, and computer systems architecture.

Contact Us


Descriptive information to help identify this paper. Follow the links below to find similar items on the Digital Library.

Degree Information


This paper discusses issues in security.

Physical Description

4 p.


Abstract: Security administration is an uphill task to implement in an enterprise network providing secured corporate services. With the slew of patches being released by network component vendors, system administrators require a barrage of tools for analyzing the risk due to vulnerabilities in those components. In addition, criticalities in patching some end hosts raises serious security issues about the network to which the end hosts are connected. In this context, it would be imperative to know the risk level of all critical resources keeping in view the everyday emerging new vulnerabilities. The authors hypothesize that sequence of network actions by attackers depends on their social and attack profile (behavioral resources such as skill level, time, and attitude). To estimate the types of attack behavior, the athors surveyed individuals for their ability and attack intent. Using the individuals' responses, the authors determined their behavioral resources and classified them as having opportunist, hacker, or explorer behavior. The profile behavioral resources can be used for determining risk by an attacker having that profile. Thus, suitable vulnerability analysis and risk management strategies can be formulated to efficiently curtail the risk from different types of attackers.


  • Institute of Electrical and Electronics Engineers International Conference on Portable Information Devices, 2007, Orlando, Florida, United States


Item Type


This paper is part of the following collection of related materials.

UNT Scholarly Works

The Scholarly Works Collection is home to materials from the University of North Texas community's research, creative, and scholarly activities and serves as UNT's Open Access Repository. It brings together articles, papers, artwork, music, research data, reports, presentations, and other scholarly and creative products representing the expertise in our university community.** Access to some items in this collection may be restricted.**

What responsibilities do I have when using this paper?


Dates and time periods associated with this paper.

Creation Date

  • March 2007

Added to The UNT Digital Library

  • Jan. 24, 2011, 2:10 p.m.

Description Last Updated

  • March 27, 2014, 11:33 a.m.

Usage Statistics

When was this paper last used?

Yesterday: 0
Past 30 days: 5
Total Uses: 264

Interact With This Paper

Here are some suggestions for what to do next.

Start Reading

PDF Version Also Available for Download.

Citations, Rights, Re-Use

Dantu, Ram; Kolan, Prakash; Loper, Kall & Akl, Robert G. Classification of Attributes and Behavior in Risk Management Using Bayesian Networks, paper, March 2007; ( accessed March 27, 2017), University of North Texas Libraries, Digital Library,; crediting UNT College of Engineering.