Cargando…

Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the...

Descripción completa

Detalles Bibliográficos
Autor principal: Chang, Kuei-Hu
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4227387/
https://www.ncbi.nlm.nih.gov/pubmed/25405226
http://dx.doi.org/10.1155/2014/506714
_version_ 1782343797516009472
author Chang, Kuei-Hu
author_facet Chang, Kuei-Hu
author_sort Chang, Kuei-Hu
collection PubMed
description Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.
format Online
Article
Text
id pubmed-4227387
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-42273872014-11-17 Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets Chang, Kuei-Hu ScientificWorldJournal Research Article Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods. Hindawi Publishing Corporation 2014 2014-10-21 /pmc/articles/PMC4227387/ /pubmed/25405226 http://dx.doi.org/10.1155/2014/506714 Text en Copyright © 2014 Kuei-Hu Chang. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Chang, Kuei-Hu
Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
title Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
title_full Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
title_fullStr Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
title_full_unstemmed Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
title_short Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
title_sort security threat assessment of an internet security system using attack tree and vague sets
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4227387/
https://www.ncbi.nlm.nih.gov/pubmed/25405226
http://dx.doi.org/10.1155/2014/506714
work_keys_str_mv AT changkueihu securitythreatassessmentofaninternetsecuritysystemusingattacktreeandvaguesets