Risk Assessment in a Sensor Cloud Framework Using Attack Graphs

被引:28
作者
Sen, Amartya [1 ]
Madria, Sanjay [1 ]
机构
[1] Missouri S&T, Dept Comp Sci, Rolla, MO 65401 USA
关键词
Attack graphs; security; risk assessment; sensor clouds; wireless sensor networks; Bayesian networks;
D O I
10.1109/TSC.2016.2544307
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A sensor cloud consists of various heterogeneous wireless sensor networks (WSNs). These WSNs may have different owners and run a wide variety of user applications on demand in a wireless communication medium. Hence, they are susceptible to various security attacks. Thus, a need exists to formulate effective and efficient security measures that safeguard these applications impacted from attack in the sensor cloud. However, analyzing the impact of different attacks and their cause-consequence relationship is a prerequisite before security measures can be either developed or deployed. In this paper, we propose a risk assessment framework for WSNs in a sensor cloud that utilizes attack graphs. We use Bayesian networks to not only assess but also to analyze attacks on WSNs. The risk assessment framework will first review the impact of attacks on a WSN and estimate reasonable time frames that predict the degradation of WSN security parameters like confidentiality, integrity and availability. Using our proposed risk assessment framework allows the security administrator to better understand the threats present and take necessary actions against them. The framework is validated by comparing the assessment results with that of the results obtained from different simulated attack scenarios.
引用
收藏
页码:942 / 955
页数:14
相关论文
共 30 条
[1]  
[Anonymous], 2007, 1 FORUM INCIDENT RES
[2]  
[Anonymous], 2014, Nessus vulnerability scanner v6.0
[3]  
[Anonymous], 2004, the third international symposium on Information processing in sensor networks
[4]  
Aven T., 2009, International Journal of Performability Engineering, V5, P447
[5]  
Barnum Sean., 2007, Attack Patterns as a Knowledge Resource for Building Secure Software
[6]  
Chen WangK. Pongaliur Li Xiao., 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, P806
[7]   Risk management using behavior based attack graphs [J].
Dantu, R ;
Loper, K ;
Kolan, P .
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, :445-449
[8]  
Dawkins J., 2002, Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, P75
[9]  
Frigault Marcel, 2008, 2008 IEEE 32nd International Computer Software and Applications Conference (COMPSAC), P698, DOI 10.1109/COMPSAC.2008.88
[10]  
Gallon L., 2011, 2011 Sixth International Conference on Availability, Reliability and Security, P59, DOI 10.1109/ARES.2011.18