2017
DOI: 10.12785/ijcnt/050103
|View full text |Cite
|
Sign up to set email alerts
|

A STRIDE Model based Threat Modelling using Unified and-Or Fuzzy Operator for Computer Network Securit

Abstract: Abstract:In the present era, security has become a fundamental issue in efficient and proper functioning of computer and network systems. To prevent and mitigate a system, an important issue to understand how different threats could damage a network system. Keeping this issue under consideration, this paper proposes risk assessment and modeling of threats which shows the level of any attack. STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privileges) is a model… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Among these operators, the UAO function [49] has some unique features (see Khan and Engelbrecht [49] for details and mathematical properties of the function). Due to the unique characteristics of the UAO function, the function has been employed effectively in many diverse studies [51][52][53][54][55][56][57], Therefore, the UAO function is also used in the underlying study. The prime uniqueness of the UAO function is that it can behave as the "AND" function or the "OR" function.…”
Section: Mathematical Representation Of Decision Rulesmentioning
confidence: 99%
“…Among these operators, the UAO function [49] has some unique features (see Khan and Engelbrecht [49] for details and mathematical properties of the function). Due to the unique characteristics of the UAO function, the function has been employed effectively in many diverse studies [51][52][53][54][55][56][57], Therefore, the UAO function is also used in the underlying study. The prime uniqueness of the UAO function is that it can behave as the "AND" function or the "OR" function.…”
Section: Mathematical Representation Of Decision Rulesmentioning
confidence: 99%
“…Although each method has its strengths in terms of covering different aspects of the system, the STRIDE threat model presents the best means of describing vulnerabilities and identifying design exploits [36]. Meanwhile, the other three methods focus more on the hazards and risk analysis of the system.…”
Section: Security Analysis and Evaluationmentioning
confidence: 99%
“…The UAO operator [24] is different and unique in the sense that a single equation is used for both AND and OR functions. Due to this capability of the UAO operator, its use has been reported in many previous studies [38][39][40][41][42][43][44][45][46][47], including simpler versions of the turbine selection problem [22,48]. Therefore, the operator is used in this paper with an improved problem model.…”
Section: Fuzzy Logic Based Turbine Selection Modelmentioning
confidence: 99%