英文摘要
|
According to the fast development of network technology and the popularization of extensive Web applications, Web information system faces various kinds of attacks, such as Trojan virus threats, DDoS attacks, system and application's vulnerability attacks, etc. The target of these attacks is for destroying Websites or stealing sensitive data. A variety of risk assessments for current systems cannot effectively identify possible paths of attacks and system vulnerabilities. Thus, the assessment results do not demonstrate a real threat path. This paper utilizes the concept of attack trees and extends and applies it to security risk analysis. Hence, we employ the features of attack tree to illustrate the situations of attacks to propose an extended attack tree analysis approach. We design an enhanced threats computing algorithm for extended attack tree analysis to calculate threats measure with consideration of attack difficulties and detective protections for assessing their influence levels. In essence, this method is different from the general risk assessment. We use 'threat' as the security unit instead of 'assets' in the risk assessment. It improves the general risk analysis approach about the poor descriptions of threats.In this paper, we use a Website system as a practical example for the Web system's security threat analysis. We can get a risk grade in Website security risk assessment for system administrator's evaluation basis. It proves that an effective risk value can be obtained from extended attack tree analysis approach for assessing a Website system. We do a comparison for our extended attack tree analysis and the traditional risk analysis approaches. Consequently, the final results indicate that our proposed method can improve the insufficient points of the traditional risk analysis and increase the availability and objectivity in risk assessment.
|
参考文献
|
-
林勤經、樊國楨、方仁威、黃景彰(2002)。資訊安全管理系統建置工作之研究。資訊管理研究,四(二),43-65。
連結:
-
行政院研究發展考核委員會(2009),『風險管理及危機處理作業手冊』,http://sec.nuk.edu.tw/updown/news/931916152171.pdf(存取日期2010/07/12)
-
政府網際服務網通報(2010),『網路安全服務』,http://gsn.nat.gov.tw/new/05-03.html(存取日期2010/06/18)
-
Microsoft TechNet (2006), ‘Guidance', available at http://technet.microsoft.com/zh-tw/library/dd548203.aspx (accessed 21 September 2010).
-
樊國楨、林樹國、朱潮昌(2008),『工業控制系統資訊安全風險評鑑實作初探』,http://fsms.bsmi.gov.tw/cat/epaper/工業控制.doc(存取日期2010/09/26)
-
OWASP (2010), ‘OWASP risk rating methodology', available at http://www.owasp.org/index.php/owasp_risk_rating_methodology (accessed 21 July 2010)
-
Zone-H (2010),‘Defacements Statistics 2010: Almost 1.5 million Websites defaced, what's happening?', available at http://www.zone-h.org/news/id/4737 (accessed 15 January 2011)
-
SANS Top 20 (2010), ‘The Top Cyber Security Risks', available at http://www.sans.org/top-cyber-security-risks/ (accessed 24 July 2010)
-
翁浩正(2010),『資訊安全:Web Security 網站安全基礎篇(一)』,http://newsletter.ascc.sinica.edu.tw/news/read_news.php?nid=1909(存取日期2010/05/04)
-
OWASP Top 10 (2010), ‘The ten most critical web application security risks', available at http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf (accessed 21 July 2010)
-
Dimitriadis, C. K.(2007).Analyzing the security of internet banking authentication mechanisms.Information Systems Control Journal,3,1-59.
-
Edge, K.,Raines, R.,Grimaila, M.,Baldwin, R.,Bennington, R.,Reuter, C.(2007).The use of attack and protection trees to analyze security for an online banking system.Proceeding of 40th Annual Hawaii International Conference on System Sciences (HICSS'07),Hawaii, USA:
-
Gan, Z.,Tang, J. F.,Wu, P.,Varadharajan, V.(2007).A novel security risk evaluation for information systems.Proceeding of 2007 Japan-China Joint Workshop on Frontier of Computer Science and Technology (FCST 2007),Wuhan, China:
-
Jin, C.,Wang, X. Y.,Tan, H. Y.(2010).Dynamic attack tree and its applications on trojan horse detection.Proceedings of the 2010 Second International Conference on MultiMedia and Information Technology (MMIT '10),Washington, DC, USA:
-
Li, X.,He, K.(2008).A unified threat model for assessing threat in Web applications.International Journal of Security and its Applications,2(3),25-30.
-
Li, X.,Liu, R.,Feng, Z. Y.,He, K.(2009).Threat modeling-oriented attack path evaluating algorithm.Transactions of Tianjin University,15,162-167.
-
Moberg, F.(2000).Gothenburg, Sweden,CHALMERS University of Technology.
-
Schneier, B.(1990).Modeling security threats.Dr. Dobb's Journal,12(24),21-29.
-
Stango, A.,Prasad, N. R.,Kyriazanos, D. M.(2009).A threat analysis methodology for security evaluation and enhancement planning.Proceedings of 2009 Third International Conference on Emerging Security Information, Systems and Technologies,Athens/Glyfada, Greece:
-
Wang, L.Y.,Liu, A.,Jajodia, S.(2006).Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts.Journal of Computer Communications,29(15),2917-2933.
-
傅雅萍、樊國楨、楊中皇(2008)。資通安全專論T97022資通安全專論T97022,未出版
-
楊尚青、王憶魯(2009)。基於系統動態方法內部威脅之分析與建模。資訊管理實務研討會,中壢市,臺灣:
-
歐士源、黃世昆(2000)。網路安全: 網路攻擊模式簡介。計算中心通訊,16(03)
-
賴義鵬、周世益(2009)。以弱點評估方式來提升資訊系統安全需求之研究。資訊管理實務研討會,中壢市,臺灣:
|