Threat risk analysis for cloud security based on attack-defense trees

Ping Wang, Wen Hui Lin, Pu Tsun Kuo, Hui Tang Lin, Tzu Chia Wang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Abstract

The existing attack trees and attack graphs schemes focused on depicting the possible intrusions by presenting the suspected attack profiles, not for interactions between threats and defenses. Consequently, it limits the adoption of the safeguards with which to select the effective defensive strategies. Accordingly, the present study proposes a new method for solving threat risk analysis problem by means of modified Attack-Defense Trees (ADT) considering the effect of both the attack cost and defense cost. The effectiveness of the proposed approach was evaluated by a set of metrics for mitigating new network threats, like APT attacks. In addition, an illustration case of threat risk analysis of cloud security is given to demonstrate our approach. Finally, the adaptability of the proposed scheme is investigated by the attributes comparison with that of the scheme presented by Edge et al. (2007). Overall, our approach provides an effective means of reconstructing the attack profiles and evaluating the countermeasures in the evolutional process of security management for cloud security.

Original languageEnglish
Title of host publicationProceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012
Pages106-111
Number of pages6
Publication statusPublished - 2012 Oct 8
Event2012 8th International Conference on Computing Technology and Information Management, ICCM 2012 - Seoul, Korea, Republic of
Duration: 2012 Apr 242012 Apr 26

Publication series

NameProceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012
Volume1

Other

Other2012 8th International Conference on Computing Technology and Information Management, ICCM 2012
CountryKorea, Republic of
CitySeoul
Period12-04-2412-04-26

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems

Cite this

Wang, P., Lin, W. H., Kuo, P. T., Lin, H. T., & Wang, T. C. (2012). Threat risk analysis for cloud security based on attack-defense trees. In Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012 (pp. 106-111). [6268478] (Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012; Vol. 1).