博弈论云安全评估的效用函数设计——以通用漏洞评分系统为例

Louai A. Maghrabi, E. Pfluegel, Senna Fathima Noorji
{"title":"博弈论云安全评估的效用函数设计——以通用漏洞评分系统为例","authors":"Louai A. Maghrabi, E. Pfluegel, Senna Fathima Noorji","doi":"10.1109/CyberSecPODS.2016.7502351","DOIUrl":null,"url":null,"abstract":"In recent years, cloud computing has emerged as a key computing paradigm because of its ubiquitous, convenient and scalable on-demand access to a shared pool of computing resources. Although the use of the cloud has many advantages, a great number of security threats exist affecting assets that are present in a cloud environment. In order to mitigate these threats, frameworks have been developed to asses the security of an organisation, based on analysing risks to critical assets. However, these frameworks are not yet sufficiently developed to specifically address risks in cloud environments. In this paper, we advocate the use of game theory to improve the security assessment of cloud environments, in particular the risk analysis step in OCTAVE. We extend previous game-theoretic models for security risk assessment within cloud environments by designing cost and benefit functions that are to a large extent informed by the Common Vulnerability Scoring System (CVSS).","PeriodicalId":134449,"journal":{"name":"2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Designing utility functions for game-theoretic cloud security assessment: a case for using the common vulnerability scoring system\",\"authors\":\"Louai A. Maghrabi, E. Pfluegel, Senna Fathima Noorji\",\"doi\":\"10.1109/CyberSecPODS.2016.7502351\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, cloud computing has emerged as a key computing paradigm because of its ubiquitous, convenient and scalable on-demand access to a shared pool of computing resources. Although the use of the cloud has many advantages, a great number of security threats exist affecting assets that are present in a cloud environment. In order to mitigate these threats, frameworks have been developed to asses the security of an organisation, based on analysing risks to critical assets. However, these frameworks are not yet sufficiently developed to specifically address risks in cloud environments. In this paper, we advocate the use of game theory to improve the security assessment of cloud environments, in particular the risk analysis step in OCTAVE. We extend previous game-theoretic models for security risk assessment within cloud environments by designing cost and benefit functions that are to a large extent informed by the Common Vulnerability Scoring System (CVSS).\",\"PeriodicalId\":134449,\"journal\":{\"name\":\"2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-06-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CyberSecPODS.2016.7502351\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberSecPODS.2016.7502351","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

摘要

近年来,云计算已经成为一种关键的计算范式,因为它无处不在、方便且可扩展地按需访问共享的计算资源池。尽管使用云有很多优点,但是存在大量影响云环境中资产的安全威胁。为了减轻这些威胁,已经开发了基于分析关键资产风险的框架来评估组织的安全性。然而,这些框架尚未充分开发,无法专门解决云环境中的风险。在本文中,我们提倡使用博弈论来改进云环境的安全评估,特别是OCTAVE中的风险分析步骤。我们通过设计在很大程度上由通用漏洞评分系统(CVSS)提供信息的成本和效益函数,扩展了以前的博弈论模型,用于云环境中的安全风险评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Designing utility functions for game-theoretic cloud security assessment: a case for using the common vulnerability scoring system
In recent years, cloud computing has emerged as a key computing paradigm because of its ubiquitous, convenient and scalable on-demand access to a shared pool of computing resources. Although the use of the cloud has many advantages, a great number of security threats exist affecting assets that are present in a cloud environment. In order to mitigate these threats, frameworks have been developed to asses the security of an organisation, based on analysing risks to critical assets. However, these frameworks are not yet sufficiently developed to specifically address risks in cloud environments. In this paper, we advocate the use of game theory to improve the security assessment of cloud environments, in particular the risk analysis step in OCTAVE. We extend previous game-theoretic models for security risk assessment within cloud environments by designing cost and benefit functions that are to a large extent informed by the Common Vulnerability Scoring System (CVSS).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信