A Novel Threat and Risk Assessment Mechanism for Security Controls in Service Management

被引:1
|
作者
Wang, Ping [1 ]
Chao, Kuo-Ming [2 ]
Lo, Chi-Chun [3 ]
机构
[1] Kun Shan Univ, Dept Informat Management, Tainan, Taiwan
[2] Coventry Univ, Fac Engn & Comp, DSM Res Grp, Convenrty, England
[3] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu, Taiwan
关键词
Cloud services; Threat and Risk Assessment; Attack profile; Attack-Defense Tree;
D O I
10.1109/ICEBE.2013.52
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breeches at a minimal cost. However, to support rational management decisions, TRA schemes require a careful analysis of the trade-off between the residual risk and the Return on Investment (ROI) given prescribed budget and time constraints. Accordingly, the present study proposes an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments. The proposed scheme enables defenders to identify appropriate countermeasures in accordance with three different defensive strategies associated with the organization's security policy. In implementing the proposed scheme, a sandbox technique is used to examine the attack profile and attack probability of various forms of cyber attacks. The cost and residual risk of various defensive strategies are then evaluated and presented to the defender as a set of recommendations. Defense evaluation metrics for each node for probabilistic analysis is used to simulate the attack results. The simulations focus specifically on the attack profile of botnet to the threat risk assessment. The validity of the proposed approach is demonstrated by simulating the TRA process for a Zeus botnet attack. Overall, the results show that iADTree provides an effective means of modeling the interaction process between the attacker and the defender, analyzing the risk at each node of the tree given various defensive strategies, and developing cost-effective countermeasures for mitigating the network threat.
引用
收藏
页码:337 / 344
页数:8
相关论文
共 50 条
  • [1] Risk assessment: Perchlorate as a national security threat
    Briggs, Chad M.
    [J]. IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2008, 27 (03) : 19 - 24
  • [2] Security Threat Management in Prison: Revalidation and Revision of the Inmate Risk Assessment for Segregation Placement
    Labrecque, Ryan M.
    [J]. PRISON JOURNAL, 2022, 102 (01): : 47 - 63
  • [3] CYBER SECURITY: THREAT IDENTIFICATION, RISK AND VULNERABILITY ASSESSMENT
    Umberger, Harold
    Gheorghe, Adrian
    [J]. ENERGY SECURITY: INTERNATIONAL AND LOCAL ISSUES, THEORETICAL PERSPECTIVES, AND CRITICAL ENERGY INFRASTRUCTURES, 2008, : 247 - 269
  • [4] Threat Analysis and Risk Assessment in Automotive Cyber Security
    Ward, David
    Ibarra, Ireri
    Ruddle, Alastair
    [J]. SAE INTERNATIONAL JOURNAL OF PASSENGER CARS-ELECTRONIC AND ELECTRICAL SYSTEMS, 2013, 6 (02): : 507 - 513
  • [5] Threat assessment: A risk management approach.
    Shapiro, Marian Kaplun
    [J]. AMERICAN JOURNAL OF CLINICAL HYPNOSIS, 2009, 51 (03) : 305 - 305
  • [6] Threat Modelling Service Security as a Security Ceremony
    Martimiano, Taciane
    Martina, Jean Everson
    [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 195 - 204
  • [7] Analysis and Security Evaluation of Security Threat on Broadcasting Service
    Jong Han Lee
    Seung Joo Kim
    [J]. Wireless Personal Communications, 2017, 95 : 4149 - 4169
  • [8] Analysis and Security Evaluation of Security Threat on Broadcasting Service
    Lee, Jong Han
    Kim, Seung Joo
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (04) : 4149 - 4169
  • [9] New approach for threat classification and security risk estimations based on security event management
    Sancho, Jose Carlos
    Caro, Andres
    avila, Mar
    Bravo, Alberto
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 : 488 - 505
  • [10] Information security risk assessment model for risk management
    Wawrzyniak, Dariusz
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30