Title
A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks.
Abstract
The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider's server contains a lot of valuable resources. LoBSs' users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs' risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs' risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing.
Year
DOI
Venue
2017
10.3390/s17030642
SENSORS
Keywords
Field
DocType
cloud computing,line-of-business services,access control,risk assessment,intrusion effort
Computer security,Network security,Risk assessment,Situation analysis,Service provider,Access control,Engineering,Wireless sensor network,Value at risk,Cloud computing
Journal
Volume
Issue
Citations 
17
3.0
3
PageRank 
References 
Authors
0.39
13
8
Name
Order
Citations
PageRank
Xu Jing130.39
Hanwen Hu230.39
Huijun Yang342.11
Man Ho Au4144497.70
Shuqin Li541.76
Naixue Xiong62413194.61
Muhammad Imran729632.69
Athanasios V. Vasilakos812735523.55