Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, Ping | en_US |
dc.contributor.author | Chao, Kuo-Ming | en_US |
dc.contributor.author | Lo, Chi-Chun | en_US |
dc.date.accessioned | 2017-04-21T06:50:07Z | - |
dc.date.available | 2017-04-21T06:50:07Z | - |
dc.date.issued | 2013 | en_US |
dc.identifier.isbn | 978-0-7695-5111-1 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1109/ICEBE.2013.52 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/135399 | - |
dc.description.abstract | Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breeches at a minimal cost. However, to support rational management decisions, TRA schemes require a careful analysis of the trade-off between the residual risk and the Return on Investment (ROI) given prescribed budget and time constraints. Accordingly, the present study proposes an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments. The proposed scheme enables defenders to identify appropriate countermeasures in accordance with three different defensive strategies associated with the organization\'s security policy. In implementing the proposed scheme, a sandbox technique is used to examine the attack profile and attack probability of various forms of cyber attacks. The cost and residual risk of various defensive strategies are then evaluated and presented to the defender as a set of recommendations. Defense evaluation metrics for each node for probabilistic analysis is used to simulate the attack results. The simulations focus specifically on the attack profile of botnet to the threat risk assessment. The validity of the proposed approach is demonstrated by simulating the TRA process for a Zeus botnet attack. Overall, the results show that iADTree provides an effective means of modeling the interaction process between the attacker and the defender, analyzing the risk at each node of the tree given various defensive strategies, and developing cost-effective countermeasures for mitigating the network threat. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Cloud services | en_US |
dc.subject | Threat and Risk Assessment | en_US |
dc.subject | Attack profile | en_US |
dc.subject | Attack-Defense Tree | en_US |
dc.title | A Novel Threat and Risk Assessment Mechanism for Security Controls in Service Management | en_US |
dc.type | Proceedings Paper | en_US |
dc.identifier.doi | 10.1109/ICEBE.2013.52 | en_US |
dc.identifier.journal | 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE) | en_US |
dc.citation.spage | 337 | en_US |
dc.citation.epage | 344 | en_US |
dc.contributor.department | 資訊管理與財務金融系 註:原資管所+財金所 | zh_TW |
dc.contributor.department | Department of Information Management and Finance | en_US |
dc.identifier.wosnumber | WOS:000330341500052 | en_US |
dc.citation.woscount | 1 | en_US |
Appears in Collections: | Conferences Paper |