File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Article: A quantitative risk assessment model involving frequency and threat degree under line-of-business services for infrastructure of emerging sensor networks

TitleA quantitative risk assessment model involving frequency and threat degree under line-of-business services for infrastructure of emerging sensor networks
Authors
KeywordsIntrusion Effort
Cloud computing
Risk assessment
Line-of-business services
Access control
Issue Date2017
Citation
Sensors, 2017, v. 17, n. 3, article no. 642 How to Cite?
Abstract© 2017 by the authors. Licensee MDPI, Basel, Switzerland. The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing.
Persistent Identifierhttp://hdl.handle.net/10722/280622
ISSN
2023 Impact Factor: 3.4
2023 SCImago Journal Rankings: 0.786
PubMed Central ID
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorJing, Xu-
dc.contributor.authorHu, Hanwen-
dc.contributor.authorYang, Huijun-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorLi, Shuqin-
dc.contributor.authorXiong, Naixue-
dc.contributor.authorImran, Muhammad-
dc.contributor.authorVasilakos, Athanasios V.-
dc.date.accessioned2020-02-17T14:34:30Z-
dc.date.available2020-02-17T14:34:30Z-
dc.date.issued2017-
dc.identifier.citationSensors, 2017, v. 17, n. 3, article no. 642-
dc.identifier.issn1424-8220-
dc.identifier.urihttp://hdl.handle.net/10722/280622-
dc.description.abstract© 2017 by the authors. Licensee MDPI, Basel, Switzerland. The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing.-
dc.languageeng-
dc.relation.ispartofSensors-
dc.rightsThis work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.-
dc.subjectIntrusion Effort-
dc.subjectCloud computing-
dc.subjectRisk assessment-
dc.subjectLine-of-business services-
dc.subjectAccess control-
dc.titleA quantitative risk assessment model involving frequency and threat degree under line-of-business services for infrastructure of emerging sensor networks-
dc.typeArticle-
dc.description.naturepublished_or_final_version-
dc.identifier.doi10.3390/s17030642-
dc.identifier.pmid28335569-
dc.identifier.pmcidPMC5375928-
dc.identifier.scopuseid_2-s2.0-85016023148-
dc.identifier.volume17-
dc.identifier.issue3-
dc.identifier.spagearticle no. 642-
dc.identifier.epagearticle no. 642-
dc.identifier.isiWOS:000398818700215-
dc.identifier.issnl1424-8220-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats