To effectively counter network attacks by hackers, defenders have developed various threat risk analysis approaches for identifying the intruder attack profile, locating the system vulnerabilities, evaluating the attack cost, and determining the potential impact cost. However, existing attack-tree and attack-graph methods focus only on the attack profile. That is, they ignore the interactions between the actions of the attacker and the defender, respectively. As a result, they limit the ability of the defender to identify suitable defense strategies. Consequently, the present study revises an Attack- Defense Tree (ADT) approach to develop a new threat risk analysis scheme which considers both the attack cost and the defense cost. A set of metrics is proposed for evaluating the effectiveness of the proposed approach in the context of an Advanced Persistent Threat (APT) attack. Finally, the proposed approach is demonstrated by performing a threat risk analysis of a typical cloud security application.
|Number of pages||11|
|Journal||International Journal of Advancements in Computing Technology|
|Publication status||Published - 2012 Sept|
All Science Journal Classification (ASJC) codes
- Computer Science(all)