首页> 外文学位 >Evaluating attack tree analysis using a structured query language-based simulation.
【24h】

Evaluating attack tree analysis using a structured query language-based simulation.

机译:使用基于结构化查询语言的仿真评估攻击树分析。

获取原文
获取原文并翻译 | 示例

摘要

Attack tree analysis is a risk assessment methodology used to identify system vulnerabilities and penetration points of a system. Attack trees describe the security or vulnerability of a system based upon the goals of the attacker. This research evaluated the effectiveness of attack tree analysis incorporated into an information system computer security risk assessment methodology by evaluating the effectiveness of using attack tree analysis to assist with costing decisions, probability analysis, and the viability of using a structured query language (SQL) computer program simulation model developed as part of this research. A pre and postassessment instrument was developed to ascertain the effectiveness of using attack tree analysis. The data-gathering technique included a purposeful sample of 56 computer security experts and leading academic authorities of attack tree analysis. The hybrid methodology incorporated quantitative data analysis using the chi-square test of homogeneity and the test for the equality of proportions; qualitative data analysis included the use of grouping of data creating bar graphs, discussions, conclusions, and other narrative components. The quantitative research findings suggested a strong support base for attack tree analysis, ranging from 71.4% to 92.9%, whereas only 21.4% to 28.6% of participants considered implementing attack tree analysis. The qualitative data suggested the transition from theory to implementation may not be achievable. The value of attack trees as a tool to enhance security is not limited to information systems. Many facets of society that utilize complex systems, such as public policy and home land security efforts, may benefit from this research. The findings implied that attack tree analysis may have the potential for positive social change based on a more secure global infrastructure.
机译:攻击树分析是一种风险评估方法,用于识别系统漏洞和系统的渗透点。攻击树根据攻击者的目标来描述系统的安全性或漏洞。这项研究通过评估使用攻击树分析来协助进行成本决策,概率分析以及使用结构化查询语言(SQL)计算机的可行性的有效性,评估了结合到信息系统计算机安全风险评估方法中的攻击树分析的有效性。程序仿真模型是本研究的一部分。开发了一种评估前后的工具,以确定使用攻击树分析的有效性。数据收集技术包括有目的的56位计算机安全专家和攻击树分析的主要学术机构的样本。混合方法结合了定量数据分析,该分析使用了卡方均一性检验和比例相等性检验。定性数据分析包括使用数据分组创建条形图,讨论,结论和其他叙述性成分。定量研究发现为攻击树分析提供了强大的支持基础,范围从71.4%到92.9%,而只有21.4%到28.6%的参与者考虑实施攻击树分析。定性数据表明,从理论到实施的过渡可能无法实现。攻击树作为增强安全性的工具的价值不仅限于信息系统。利用复杂系统的社会许多方面,例如公共政策和国土安全工作,可能会从这项研究中受益。研究结果表明,基于更安全的全球基础架构,攻击树分析可能会带来积极的社会变革。

著录项

  • 作者

    Pallos, Michael S.;

  • 作者单位

    Walden University.;

  • 授予单位 Walden University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2005
  • 页码 162 p.
  • 总页数 162
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号