基于模糊的威胁评估模型

Nevrus Kaja, A. Shaout, Di Ma
{"title":"基于模糊的威胁评估模型","authors":"Nevrus Kaja, A. Shaout, Di Ma","doi":"10.1109/ACIT47987.2019.8991129","DOIUrl":null,"url":null,"abstract":"Threat assessment is the process of identifying and characterizing a cybersecurity threat by evaluating and assessing its properties. This is a tool used by many organizations around the globe in order to evaluate their systems and perform a risk analysis against common threats. SAE J3061 guidelines provide a set of principles for automotive cybersecurity which includes threat identification, assessment, and analysis. This standard defines threat assessment as “an analysis technique that is applied in the concept phase to help identify potential threats to a feature and to assess the risk associated with the identified threats”. This paper presents an innovative, Fuzzy Based Threat Assessment Model (FTAM). FTAM leverages the threat characterization from established threat assessment models, while focusing on improving its assessment capabilities by using Fuzzy Logic. Through this methodology, FTAM is able to improve the efficiency and accuracy of the threat assessment process to determine the “degree” of the threat. This is different from using subjective assessment processes based on table look-ups or scoring like some of the current threat assessment models do. This paper provides an analysis on the design and performance of FTAM as well as benchmarking with other existing models.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Fuzzy Based Threat Assessment Model (FTAM)\",\"authors\":\"Nevrus Kaja, A. Shaout, Di Ma\",\"doi\":\"10.1109/ACIT47987.2019.8991129\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Threat assessment is the process of identifying and characterizing a cybersecurity threat by evaluating and assessing its properties. This is a tool used by many organizations around the globe in order to evaluate their systems and perform a risk analysis against common threats. SAE J3061 guidelines provide a set of principles for automotive cybersecurity which includes threat identification, assessment, and analysis. This standard defines threat assessment as “an analysis technique that is applied in the concept phase to help identify potential threats to a feature and to assess the risk associated with the identified threats”. This paper presents an innovative, Fuzzy Based Threat Assessment Model (FTAM). FTAM leverages the threat characterization from established threat assessment models, while focusing on improving its assessment capabilities by using Fuzzy Logic. Through this methodology, FTAM is able to improve the efficiency and accuracy of the threat assessment process to determine the “degree” of the threat. This is different from using subjective assessment processes based on table look-ups or scoring like some of the current threat assessment models do. This paper provides an analysis on the design and performance of FTAM as well as benchmarking with other existing models.\",\"PeriodicalId\":314091,\"journal\":{\"name\":\"2019 International Arab Conference on Information Technology (ACIT)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Arab Conference on Information Technology (ACIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACIT47987.2019.8991129\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Arab Conference on Information Technology (ACIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACIT47987.2019.8991129","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

威胁评估是通过评估和评估网络安全威胁的属性来识别和描述网络安全威胁的过程。这是全球许多组织用来评估其系统并针对常见威胁执行风险分析的工具。SAE J3061指南为汽车网络安全提供了一套原则,包括威胁识别、评估和分析。该标准将威胁评估定义为“一种在概念阶段应用的分析技术,以帮助识别对某一特性的潜在威胁,并评估与已识别的威胁相关的风险”。提出了一种创新的基于模糊的威胁评估模型(FTAM)。FTAM利用已建立的威胁评估模型中的威胁特征,同时专注于通过使用模糊逻辑来提高其评估能力。通过这种方法,FTAM能够提高威胁评估过程的效率和准确性,以确定威胁的“程度”。这不同于使用基于表查找或评分的主观评估过程,就像一些当前的威胁评估模型所做的那样。本文对FTAM的设计和性能进行了分析,并与其他现有模型进行了基准测试。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Fuzzy Based Threat Assessment Model (FTAM)
Threat assessment is the process of identifying and characterizing a cybersecurity threat by evaluating and assessing its properties. This is a tool used by many organizations around the globe in order to evaluate their systems and perform a risk analysis against common threats. SAE J3061 guidelines provide a set of principles for automotive cybersecurity which includes threat identification, assessment, and analysis. This standard defines threat assessment as “an analysis technique that is applied in the concept phase to help identify potential threats to a feature and to assess the risk associated with the identified threats”. This paper presents an innovative, Fuzzy Based Threat Assessment Model (FTAM). FTAM leverages the threat characterization from established threat assessment models, while focusing on improving its assessment capabilities by using Fuzzy Logic. Through this methodology, FTAM is able to improve the efficiency and accuracy of the threat assessment process to determine the “degree” of the threat. This is different from using subjective assessment processes based on table look-ups or scoring like some of the current threat assessment models do. This paper provides an analysis on the design and performance of FTAM as well as benchmarking with other existing models.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信