Threat risk analysis for cloud security based on attack-defense trees

Ping Wang, Wen Hui Lin, Pu Tsun Kuo, Hui Tang Lin, Tzu Chia Wang

研究成果: Conference contribution

29 引文 斯高帕斯(Scopus)

摘要

The existing attack trees and attack graphs schemes focused on depicting the possible intrusions by presenting the suspected attack profiles, not for interactions between threats and defenses. Consequently, it limits the adoption of the safeguards with which to select the effective defensive strategies. Accordingly, the present study proposes a new method for solving threat risk analysis problem by means of modified Attack-Defense Trees (ADT) considering the effect of both the attack cost and defense cost. The effectiveness of the proposed approach was evaluated by a set of metrics for mitigating new network threats, like APT attacks. In addition, an illustration case of threat risk analysis of cloud security is given to demonstrate our approach. Finally, the adaptability of the proposed scheme is investigated by the attributes comparison with that of the scheme presented by Edge et al. (2007). Overall, our approach provides an effective means of reconstructing the attack profiles and evaluating the countermeasures in the evolutional process of security management for cloud security.

原文English
主出版物標題Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012
頁面106-111
頁數6
出版狀態Published - 2012 10月 8
事件2012 8th International Conference on Computing Technology and Information Management, ICCM 2012 - Seoul, Korea, Republic of
持續時間: 2012 4月 242012 4月 26

出版系列

名字Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012
1

Other

Other2012 8th International Conference on Computing Technology and Information Management, ICCM 2012
國家/地區Korea, Republic of
城市Seoul
期間12-04-2412-04-26

All Science Journal Classification (ASJC) codes

  • 電腦網路與通信
  • 資訊系統

指紋

深入研究「Threat risk analysis for cloud security based on attack-defense trees」主題。共同形成了獨特的指紋。

引用此