TY - JOUR
T1 - Threat risk analysis for cloud security based on Attack-Defense Trees
AU - Wang, Ping
AU - Lin, Hui Tang
AU - Wang, Tzu Chia
AU - Lin, Wen Hui
AU - Kuo, Pu Tsun
PY - 2012/9
Y1 - 2012/9
N2 - To effectively counter network attacks by hackers, defenders have developed various threat risk analysis approaches for identifying the intruder attack profile, locating the system vulnerabilities, evaluating the attack cost, and determining the potential impact cost. However, existing attack-tree and attack-graph methods focus only on the attack profile. That is, they ignore the interactions between the actions of the attacker and the defender, respectively. As a result, they limit the ability of the defender to identify suitable defense strategies. Consequently, the present study revises an Attack- Defense Tree (ADT) approach to develop a new threat risk analysis scheme which considers both the attack cost and the defense cost. A set of metrics is proposed for evaluating the effectiveness of the proposed approach in the context of an Advanced Persistent Threat (APT) attack. Finally, the proposed approach is demonstrated by performing a threat risk analysis of a typical cloud security application.
AB - To effectively counter network attacks by hackers, defenders have developed various threat risk analysis approaches for identifying the intruder attack profile, locating the system vulnerabilities, evaluating the attack cost, and determining the potential impact cost. However, existing attack-tree and attack-graph methods focus only on the attack profile. That is, they ignore the interactions between the actions of the attacker and the defender, respectively. As a result, they limit the ability of the defender to identify suitable defense strategies. Consequently, the present study revises an Attack- Defense Tree (ADT) approach to develop a new threat risk analysis scheme which considers both the attack cost and the defense cost. A set of metrics is proposed for evaluating the effectiveness of the proposed approach in the context of an Advanced Persistent Threat (APT) attack. Finally, the proposed approach is demonstrated by performing a threat risk analysis of a typical cloud security application.
UR - http://www.scopus.com/inward/record.url?scp=84867187834&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84867187834&partnerID=8YFLogxK
U2 - 10.4156/ijact.vol4.issue17.70
DO - 10.4156/ijact.vol4.issue17.70
M3 - Article
AN - SCOPUS:84867187834
SN - 2005-8039
VL - 4
SP - 607
EP - 617
JO - International Journal of Advancements in Computing Technology
JF - International Journal of Advancements in Computing Technology
IS - 17
ER -