Cargando…
Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the...
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4227387/ https://www.ncbi.nlm.nih.gov/pubmed/25405226 http://dx.doi.org/10.1155/2014/506714 |
_version_ | 1782343797516009472 |
---|---|
author | Chang, Kuei-Hu |
author_facet | Chang, Kuei-Hu |
author_sort | Chang, Kuei-Hu |
collection | PubMed |
description | Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods. |
format | Online Article Text |
id | pubmed-4227387 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-42273872014-11-17 Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets Chang, Kuei-Hu ScientificWorldJournal Research Article Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods. Hindawi Publishing Corporation 2014 2014-10-21 /pmc/articles/PMC4227387/ /pubmed/25405226 http://dx.doi.org/10.1155/2014/506714 Text en Copyright © 2014 Kuei-Hu Chang. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Chang, Kuei-Hu Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets |
title | Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets |
title_full | Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets |
title_fullStr | Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets |
title_full_unstemmed | Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets |
title_short | Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets |
title_sort | security threat assessment of an internet security system using attack tree and vague sets |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4227387/ https://www.ncbi.nlm.nih.gov/pubmed/25405226 http://dx.doi.org/10.1155/2014/506714 |
work_keys_str_mv | AT changkueihu securitythreatassessmentofaninternetsecuritysystemusingattacktreeandvaguesets |