{"title":"使用攻击图评估SOA安全度量","authors":"J. Magott, Marek Woda","doi":"10.1504/IJCCBS.2010.031712","DOIUrl":null,"url":null,"abstract":"First, different security metrics are presented. A proposal of risk assessment for service oriented architecture (SOA) is given. This proposal is based on service availability metrics. First metric represents costs (extend of damage), when the service is not available. The second one is a probability that the service is available. Foundations for calculating this probability by simulation using attack graphs are given. The attack graph is a representation of actions that end in a state where an intruder achieved his/her goal. A model of intrusion detection system is given too.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Evaluation of SOA Security Metrics Using Attack Graphs\",\"authors\":\"J. Magott, Marek Woda\",\"doi\":\"10.1504/IJCCBS.2010.031712\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"First, different security metrics are presented. A proposal of risk assessment for service oriented architecture (SOA) is given. This proposal is based on service availability metrics. First metric represents costs (extend of damage), when the service is not available. The second one is a probability that the service is available. Foundations for calculating this probability by simulation using attack graphs are given. The attack graph is a representation of actions that end in a state where an intruder achieved his/her goal. A model of intrusion detection system is given too.\",\"PeriodicalId\":167937,\"journal\":{\"name\":\"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-06-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJCCBS.2010.031712\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJCCBS.2010.031712","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluation of SOA Security Metrics Using Attack Graphs
First, different security metrics are presented. A proposal of risk assessment for service oriented architecture (SOA) is given. This proposal is based on service availability metrics. First metric represents costs (extend of damage), when the service is not available. The second one is a probability that the service is available. Foundations for calculating this probability by simulation using attack graphs are given. The attack graph is a representation of actions that end in a state where an intruder achieved his/her goal. A model of intrusion detection system is given too.