Threat risk analysis for cloud security based on Attack-Defense Trees

Ping Wang, Hui Tang Lin, Tzu Chia Wang, Wen Hui Lin, Pu Tsun Kuo

研究成果: Article同行評審

1 引文 斯高帕斯(Scopus)

摘要

To effectively counter network attacks by hackers, defenders have developed various threat risk analysis approaches for identifying the intruder attack profile, locating the system vulnerabilities, evaluating the attack cost, and determining the potential impact cost. However, existing attack-tree and attack-graph methods focus only on the attack profile. That is, they ignore the interactions between the actions of the attacker and the defender, respectively. As a result, they limit the ability of the defender to identify suitable defense strategies. Consequently, the present study revises an Attack- Defense Tree (ADT) approach to develop a new threat risk analysis scheme which considers both the attack cost and the defense cost. A set of metrics is proposed for evaluating the effectiveness of the proposed approach in the context of an Advanced Persistent Threat (APT) attack. Finally, the proposed approach is demonstrated by performing a threat risk analysis of a typical cloud security application.

原文English
頁(從 - 到)607-617
頁數11
期刊International Journal of Advancements in Computing Technology
4
發行號17
DOIs
出版狀態Published - 2012 9月

All Science Journal Classification (ASJC) codes

  • 電腦科學(全部)

指紋

深入研究「Threat risk analysis for cloud security based on Attack-Defense Trees」主題。共同形成了獨特的指紋。

引用此