Skip to main content

Validation of IT Risk Assessments with Markov Logic Networks

  • Conference paper
  • First Online:
  • 554 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9488))

Abstract

Risk assessments of big and complex IT infrastructures comprise numerous qualitative risk estimations for infrastructure assets. Qualitative risk estimations, however, are subjective and thus prone to errors. We present an approach to detect anomalies in the result of risk assessments by considering information about inter-dependencies between various building blocks of IT landscapes from enterprise architecture management. We therefore integrate data from enterprise architecture and risk estimations using Semantic Web technologies and formalize common anomalies such as inconsistent estimations of dependent infrastructure components. To reflect the uncertainty of qualitative analyses we utilize Markov logic networks (MLN) to validate the resulting model and determine more probable and consistent estimations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    In the following we use type writer fonts like infra for statements in first-order logic.

  2. 2.

    http://alchemy.cs.washington.edu.

  3. 3.

    http://hazy.cs.wisc.edu/hazy/tuffy.

  4. 4.

    https://code.google.com/p/rockit.

References

  1. Zambon, E., Etalle, S., Wieringa, R.J., Hartel, P.: Model-based qualitative risk assessment for availability of it infrastructures. Softw. Syst. Model. 10(4), 553–580 (2011)

    Article  Google Scholar 

  2. IBM X-Force: Mid-year trend and risk report 2013. Technical report, IBM X-Force (2013)

    Google Scholar 

  3. Technical Department of ENISA Section Risk Management: ENISA: Risk management: implementation principles and inventories for risk management/risk assessment methods and tools. Technical report, European Network and Information Security Agency (ENISA) (2006)

    Google Scholar 

  4. Bundesamt für Sicherheit in der Informationstechnik: IT-Grundschutz-Kataloge. Technical report, Bundesamt für Sicherheit in der Informationstechnik (2013)

    Google Scholar 

  5. Berners-Lee, T., Hendler, J., Lassila, O., et al.: The semantic web. Sci. Am. 284(5), 28–37 (2001)

    Article  Google Scholar 

  6. Sheth, A., Henson, C., Sahoo, S.S.: Semantic sensor web. IEEE Internet Comput. 12(4), 78–83 (2008)

    Article  Google Scholar 

  7. Chen, W., Hess, C., Langermeier, M., Stülpnagel, J., Diefenthaler, P.: Semantic enterprise architecture management. In: ICEIS, vol. 3, pp. 318–325 (2013)

    Google Scholar 

  8. Jain, D.: Knowledge engineering with markov logic networks: a review. In: Beierle, C., Kern-Isberner, G. (eds.) Evolving Knowledge in Theory and Applications. Informatik-Bericht, vol. 361, pp. 16–30. Fakultät für Mathematik und Informatik, FernUniversität, Hagen (2011)

    Google Scholar 

  9. Richardson, M., Domingos, P.: Markov logic networks. Mach. Learn. 62(1–2), 107–136 (2006)

    Article  Google Scholar 

  10. Motik, B., Grau, B., Horrocks, I., Wu, Z., Fokoue, A., Lutz, C.: OWL 2 web ontology language: Profiles. W3C recommendation (2012)

    Google Scholar 

  11. Kalfoglou, Y., Schorlemmer, M.: Ontology mapping: the state of the art. Knowl. Eng. Rev. 18(01), 1–31 (2003)

    Article  MATH  Google Scholar 

  12. Braun, S., Schmidt, A., Walter, A., Nagypal, G., Zacharias, V.: Ontology maturing: a collaborative web 2.0 approach to ontology engineering. In: Noy, N., Alani, H., Stumme, G., Mika, P., Sure, Y., Vrandecic, D. (eds.): Proceedings of the Workshop on Social and Collaborative Construction of Structured Knowledge (CKC 2007) at the 16th International World Wide Web Conference (WWW2007), CEUR Workshop Proceedings, 8 May 2007, Banff, Canada, vol. 273 (2007)

    Google Scholar 

  13. Braz, R., Amir, E., Roth, D.: A survey of first-order probabilistic models. In: Holmes, D., Jain, L. (eds.) Innovations in Bayesian Networks. SCI vol. 156, pp. 289–317. Springer, Berlin Heidelberg (2008)

    Google Scholar 

  14. Weber, P., Medina-Oliva, G., Simon, C., Iung, B.: Overview on Bayesian networks applications for dependability, risk analysis and maintenance areas. Eng. Appl. Artif. Intell. 25(4), 671–682 (2012)

    Article  Google Scholar 

  15. Kersting, K., De Raedt, L.: Bayesian logic programs. CoRR cs.AI/0111058 (2001)

    Google Scholar 

  16. Niepert, M., Noessner, J., Meilicke, C., Stuckenschmidt, H.: Probabilistic-logical web data integration. In: Polleres, A., d’Amato, C., Arenas, M., Handschuh, S., Kroner, P., Ossowski, S., Patel-Schneider, P. (eds.) Reasoning Web 2011. LNCS, vol. 6848, pp. 504–533. Springer, Heidelberg (2011)

    Google Scholar 

  17. von Stülpnagel, J., Ortmann, J., Schoenfisch, J.: IT risk management with Markov logic networks. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 301–315. Springer, Heidelberg (2014)

    Google Scholar 

  18. Parsia, B., Sirin, E., Kalyanpur, A.: Debugging owl ontologies. In: Proceedings of the 14th International Conference on World Wide Web, pp. 633–640. ACM (2005)

    Google Scholar 

  19. Stuckenschmidt, H.: Debugging owl ontologies-a reality check. In: EON (2008)

    Google Scholar 

  20. Domingos, P., Lowd, D., Kok, S., Poon, H., Richardson, M., Singla, P.: Uncertainty Reasoning for the Semantic Web I. Springer, Heidelberg (2008)

    Google Scholar 

  21. Noessner, J., Niepert, M., Stuckenschmidt, H.: Rockit: Exploiting parallelism and symmetry for map inference in statistical relational models. In: des Jardins, M., Littman, M. (eds.) Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, July 14–18, 2012, Bellevue, Washington, USA. AAAI Press (2013)

    Google Scholar 

Download references

Acknowledgement

This work has been partially supported by the German Federal Ministry of Economics and Technology (BMWI) in the framework of the Central Innovation Program SME (Zentrales Innovationsprogramm Mittelstand - ZIM) within the project “Risk management tool for complex IT infrastructures”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Janno von Stülpnagel .

Editor information

Editors and Affiliations

A RockIt MLN

A RockIt MLN

For our MLN, we use the syntax of RockIt [21]. RockIt expects first order formulas in conjunctive normal form (CNF). An online version of RockIt is available here: http://executor.informatik.uni-mannheim.de/systems/rockit/

figure d

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Stülpnagel, J.v., Chen, W. (2015). Validation of IT Risk Assessments with Markov Logic Networks. In: Seehusen, F., Felderer, M., Großmann, J., Wendland, MF. (eds) Risk Assessment and Risk-Driven Testing. RISK 2015. Lecture Notes in Computer Science(), vol 9488. Springer, Cham. https://doi.org/10.1007/978-3-319-26416-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26416-5_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26415-8

  • Online ISBN: 978-3-319-26416-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics