2019
DOI: 10.1016/j.future.2019.02.045
|View full text |Cite
|
Sign up to set email alerts
|

Bayesian network based weighted APT attack paths modeling in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 44 publications
(20 citation statements)
references
References 9 publications
0
18
0
2
Order By: Relevance
“…EMD and HHT signal analysis methods were used to compare and detect the LDoS attack in the two traffic trace files. The security model in WSN and edge computing are proposed and researched [15][16][17]. They can be references to the security model in this paper.…”
Section: Data Analysis Work-flow and Network Attack Scenariomentioning
confidence: 99%
“…EMD and HHT signal analysis methods were used to compare and detect the LDoS attack in the two traffic trace files. The security model in WSN and edge computing are proposed and researched [15][16][17]. They can be references to the security model in this paper.…”
Section: Data Analysis Work-flow and Network Attack Scenariomentioning
confidence: 99%
“…Thus, this method can be complementary to our method. Some other approaches for assessing cloud system reliability and security have been also explored in Yuan et al, 48 Herscheid et al, 49 Zimba et al, 50 and Wang et al 51 However, as stated in Cheng et al, 52 ''resilience to errors in the underlying hardware is a key design objective for a large class of computing systems, from embedded systems all the way to the cloud.'' To the best of our knowledge, our work is one of the few that sets up dependability models and the simulator of cloud systems, in order to understand failure behaviors originated in different levels of the CPU or bit-flips in registers.…”
Section: Related Workmentioning
confidence: 99%
“…MTA and MTD players select the optimal strategy according to the cost-benefit of attack-defense to maximize the attack-defense payoff, which has a non-cooperative relationship. In the process of defense confrontation, MTA attempts to control the attack surface of the system through various attack means, expanding the exposure scope of the attack surface, and preparing for the subsequent continuous attack [11]. On the contrary, MTD controls the attack surface of the system through dynamic, randomized and diversified methods, transferring or reducing the attack surface of the system, so as to reject the attack action of MTA.…”
Section: Fig 1 Corresponding Relationship Between Attack-defense Anmentioning
confidence: 99%
“…The defense and security committee of the White House gave the concept of moving target in the cyberspace security research progress report [11] in 2012, moving target is a technical mean that can reduce the attacker's advantage and increase the system flexibility through transformation in multiple dimensions organized in Table 2. In 2014, Department of Defense Intelligence Intelligence of U.S. defined MTD as a defense means to create, analyze, evaluate and deploy diversified and time-varying mechanisms and strategies, so as to increase the complexity and cost of attack implementation, limit and reduce the vulnerability exposure and the probability of being attacked, and improve the flexibility of the system [12].…”
Section: Mtd Defense Strategymentioning
confidence: 99%