File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.3390/s17030642
- Scopus: eid_2-s2.0-85016023148
- PMID: 28335569
- WOS: WOS:000398818700215
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: A quantitative risk assessment model involving frequency and threat degree under line-of-business services for infrastructure of emerging sensor networks
Title | A quantitative risk assessment model involving frequency and threat degree under line-of-business services for infrastructure of emerging sensor networks |
---|---|
Authors | |
Keywords | Intrusion Effort Cloud computing Risk assessment Line-of-business services Access control |
Issue Date | 2017 |
Citation | Sensors, 2017, v. 17, n. 3, article no. 642 How to Cite? |
Abstract | © 2017 by the authors. Licensee MDPI, Basel, Switzerland. The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing. |
Persistent Identifier | http://hdl.handle.net/10722/280622 |
ISSN | 2023 Impact Factor: 3.4 2023 SCImago Journal Rankings: 0.786 |
PubMed Central ID | |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jing, Xu | - |
dc.contributor.author | Hu, Hanwen | - |
dc.contributor.author | Yang, Huijun | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Li, Shuqin | - |
dc.contributor.author | Xiong, Naixue | - |
dc.contributor.author | Imran, Muhammad | - |
dc.contributor.author | Vasilakos, Athanasios V. | - |
dc.date.accessioned | 2020-02-17T14:34:30Z | - |
dc.date.available | 2020-02-17T14:34:30Z | - |
dc.date.issued | 2017 | - |
dc.identifier.citation | Sensors, 2017, v. 17, n. 3, article no. 642 | - |
dc.identifier.issn | 1424-8220 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280622 | - |
dc.description.abstract | © 2017 by the authors. Licensee MDPI, Basel, Switzerland. The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing. | - |
dc.language | eng | - |
dc.relation.ispartof | Sensors | - |
dc.rights | This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. | - |
dc.subject | Intrusion Effort | - |
dc.subject | Cloud computing | - |
dc.subject | Risk assessment | - |
dc.subject | Line-of-business services | - |
dc.subject | Access control | - |
dc.title | A quantitative risk assessment model involving frequency and threat degree under line-of-business services for infrastructure of emerging sensor networks | - |
dc.type | Article | - |
dc.description.nature | published_or_final_version | - |
dc.identifier.doi | 10.3390/s17030642 | - |
dc.identifier.pmid | 28335569 | - |
dc.identifier.pmcid | PMC5375928 | - |
dc.identifier.scopus | eid_2-s2.0-85016023148 | - |
dc.identifier.volume | 17 | - |
dc.identifier.issue | 3 | - |
dc.identifier.spage | article no. 642 | - |
dc.identifier.epage | article no. 642 | - |
dc.identifier.isi | WOS:000398818700215 | - |
dc.identifier.issnl | 1424-8220 | - |