Security threat assessment of an Internet security system using attack tree and vague sets
- PMID: 25405226
- PMCID: PMC4227387
- DOI: 10.1155/2014/506714
Security threat assessment of an Internet security system using attack tree and vague sets
Abstract
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.
Figures







References
-
- Tidwell T., Larson R., Fitch K., Hale J. Modeling internet attacks. Proceedings of the IEEE Workshop on Information Assurance and Security; 2001; United States Military Academy; pp. 54–59.
-
- Dhillon G., Torkzadeh G. Value-focused assessment of information system security in organizations. Information Systems Journal. 2006;16(3):293–314. doi: 10.1111/j.1365-2575.2006.00219.x. - DOI
-
- Satoh N., Kumamoto H., Kino Y. Viewpoint of ISO GMITS and probabilistic risk assessment in information security. International Journal of Systems Applications, Engineering and Development. 2008;2(4):237–244.
-
- Symantec Corporation Full report: internet security threat report. vol. 18, 2013.
-
- Opdahl A. L., Sindre G. Experimental comparison of attack trees and misuse cases for security threat identification. Information and Software Technology. 2009;51(5):916–932. doi: 10.1016/j.infsof.2008.05.013. - DOI
Publication types
MeSH terms
LinkOut - more resources
Full Text Sources
Other Literature Sources